We recently announced our expanded partnership with VMware Carbon Black for improved endpoint protection. Our technical integration, via our ActiveEye portal, delivers managed detection and response (MDR) capabilities that enable us to be much more responsive and go beyond basic prevention, especially when it comes to endpoint protection. In this blog, I’ll dive deeper into… Read More
Author: Matthew McTigue
Microsoft Defender ATP and ActiveEye Integration Makes it Easier to Detect Threats
Earlier this week we announced that Microsoft Defender ATP is now integrated with our cloud-native Security Orchestration and Automation (SOAR) platform, ActiveEye. In today’s blog, I wanted to share a bit more context about what this means from a practical perspective. Adding support for Microsoft Defender Advanced Threat Protection (ATP) is part of our… Read More
Google Advanced Protection Program Helps Prevent G Suite Account Compromise
Google recently announced some new features to help prevent G Suite account compromise and provide extra protection for sensitive accounts. These features are available via the Google Advanced Protection Program, or GAPP, which adds additional safeguards for high-risk users. Key Features One could easily argue that the most important aspect of GAPP is the requirement to use physical security keys…. Read More
Why It’s Time to Update Your Endpoint Security Approach
When it comes to cyber threats, the endpoint is often where the action is. In today’s post, we’ll discuss why it’s time to update your endpoint security approach. We’ll also offer some recommendations for how to go about this. Why Antivirus + Perimeter Protection is No Longer Enough For the last 20-plus years, the primary… Read More
G Suite Security Best Practices: Proactive Steps to Stay Safe with SOC-as-a-Service
In today’s post we’ll discuss Google G Suite security best practices and some proactive steps you can take for a security tune-up. None of these recommendations are particularly hard to implement. But cloud security requires a different mindset than traditional security operations, so even savvy security teams often overlook them. We’ll also take a look… Read More