Security automation is critical to identifying threats and resolving alerts faster. It plays a starring role in the latest release of our cloud-native Security Orchestration and Automation (SOAR) platform, ActiveEye 2.0. Here are just a few highlights of all the new features: Advanced security automation processes more than 95 percent of alerts, so our security operations… Read More
Author: Tempy Wright
[New Research] 2019 Cloud Security Report Reveals Top Challenges
The new 2019 Cloud Security Report is here, and we’re excited to share it with you. The report includes the latest cloud security trends and data points to help you benchmark how your own organization is doing. It also has insights into cloud security threats, organizational investment priorities, and solutions. Delta Risk partnered with our colleagues at… Read More
G Suite Security: Five Mistakes Every Admin Should Avoid
If your business is migrating to or using Google’s suite of business productivity tools, you might be concerned about properly securing G Suite use. While Microsoft Office 365 still wears the cloud office productivity crown, more than five million businesses now use G Suite, and that number is growing fast. Our partners at Okta noted in their 2019 “Business @… Read More
How to Improve Your Office 365 Data Protection and Threat Mitigation Strategies
In today’s post, we’ll discuss how to improve your Office 365 data protection and threat mitigation approach to better protect your environment from external threats. In our previous post about Office 365 security features, we outlined how to make the deluge of Office 365 security event information actionable. We also highlighted the importance of implementing sound identity, access, and privilege management approaches. Now let’s see what else you… Read More
Office 365 Security Features Demystified
Microsoft has numerous Office 365 security features built in to help you monitor activity, protect data, identify threats, and manage identity, access, and privileges. But getting the most out of those tools can be difficult, particularly for mid-sized organizations. Integrating them with data from other sources in your network and cloud is even more challenging…. Read More