Protecting remote workers with strong endpoint security is more important than ever. As we’ve heard from countless news stories and our own clients, many companies are moving to work from home policies and enabling remote staff in rapid time. Here’s a step-by-step checklist of what you can do now to protect your remote workers with… Read More
Author: John Hawley
How to Determine if SOC-as-a-Service is Right for Your Organization
In today’s blog, we’ll explain what a Security Operations Center (SOC) is, and help you determine if a SOC-as-a-Service (SOCaaS) solution is right for your organization. Just because you’re tasked with managing cyber security for your company, it doesn’t mean your company is in business to do cyber security. Unless you’re a cyber security provider, your… Read More
New G Suite Security Features Protect Against Rogue Apps
In today’s blog, we’ll take a look at some new G Suite security features. These features are designed to prevent threats from unauthorized or rogue applications. Most of our customers have already adopted enterprise Software-as-a-Service (SaaS) applications or are evaluating them. The most popular ones are office automation suites like G Suite and Office 365. These cloud-based solutions… Read More
Considering Next-Gen Endpoint Security? Where to Start
If you’re considering moving to a next-gen endpoint security solution, it can be confusing. You’ll find a wide range of options from multiple vendors that offer similar capabilities, which can make it difficult to know where to start. Next-generation endpoint detection and response (EDR) solutions are still relatively new, and the market is quite fragmented…. Read More
Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster
We’ve just released a new feature in our ActiveEye platform that lets you visualize network activity in Amazon virtual private clouds (VPCs). In today’s blog we’ll discuss why we developed this capability. We will also explain how you can use it to detect potential security threats faster. DevOps teams are rapidly deploying applications to cloud environments. We… Read More
SOC-as-a-Service Overview: Improving AWS and Azure Security [Part II]
In part two of our SOC-as-Service overview, we’ll look at how a cloud-based security operations center (SOC) can improve AWS and Azure security, and why you should consider this instead of build a SOC. As we discussed in our previous post, many organizations are turning to SOC-as-a-Service to get the cloud security expertise they need without having to… Read More