Dwell Time, Agent Smith and Modernizing Your SIEM

The more data, users and devices there are, the more points of vulnerability and risks of cyberattack there are. So why are so many IT departments relying on out-of-date cybersecurity technologies? For some, this is a byproduct of a limited budget or the skills shortage. For others, the lack of a significant incident might be [...]

By |2019-08-07T09:27:58-05:00August 5th, 2019|Blog|Comments Off on Dwell Time, Agent Smith and Modernizing Your SIEM

The Top Three Requirements for Securing Endpoints

Admit it—when you were a kid, you checked your closet for monsters or underneath your bed, fearing that your worst nightmare was out to get you. For IT leaders, there’s something a lot scarier than the boogeyman: a security breach. Desktops, laptops, smartphones and tablets are endpoints that represent vulnerable points of entry for cybercriminals. [...]

By |2018-12-26T21:42:16-05:00October 11th, 2017|Blog|Comments Off on The Top Three Requirements for Securing Endpoints