<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Blog

Read all of our news, articles, reviews, and more in our company blog

Datashield

Datashield

Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Recent Posts:

What is a VPN?

What is a VPN and how does it work?

How to Deploy: Carbon Black (CB) Defense Sensor

Carbon Black (CB) Defense is a distributed process monitoring tool for threat detection across enterprise networks. The Carbon Black sensor executes data capturing activities to discover suspicious activities that occur within a network. Once deployed, the CB Defense sensor stays on and always collects data that can be categorized and analyzed for suspicious activities.

Payment Card Industry Data Security Standard (PCI DSS) Compliance Overview

From local coffee shops to international e-commerce giants, the widespread adoption of credit card payments online and through mobile applications continues to grow. Such popular credit card transaction practices raise pressing questions about the overall security of online payments and ban card transactions in particular.  

FortiSIEM Overview

The complexities of security management across enterprise estates consisting of virtual machines, cloud, endpoints, and IoT devices require a cybersecurity solution that protects expansive IT infrastructure.

A Message Concerning Coronavirus (COVID-19)

Datashield is an organization that’s core focus is security.  In light of the current Coronavirus (COVID-19) pandemic, we are taking guidance from the CDC and implementing changes to protect the health of our employees and customers.  Read more about the official policies at ADT.com/coronavirus.

Why Phishing is Still a Problem

Is Phishing Still a Problem?

California Consumer Privacy Act (CCPA) Summary

Starting January 1, 2020, the state of California enforces the most far-reaching data-privacy legislation in the history of the United States.

How Does Mimecast Work?

Mimecast is a cloud-based, anti-spam, and archive filtering service for securing email accounts and communications for businesses.

Citrix Vulnerability Mitigation (CVE-2019-19781)

This post is an informational announcement detailing the Citrix NetScaler Vulnerability and what Datashield is doing to help our customers detect and mitigate the issue. Since the announcement of the vulnerability in Citrix devices (CVE-2019-19781) Datashield has performed extensive analysis and research on exploit attempts, attack patterns, and the latest intelligence. Citrix released security bulletin CTX267027 containing information on a vulnerability in various Citrix Products. This allows an unauthenticated attack that allows remote code execution.

A Closer Look at LogRhythm XM for the Mid-Market

LogRhythm XM is a powerful yet compact version of LogRhythm Enterprise that is the perfect solution for many organizations in the mid-market. Learn more about the available all-in-one SIEM options and how Datashield helps companies successfully install and managed LogRhythm XM. The early days of tackling cyber threats involved a team of crack detectives diving through thousands of alerts produced by traditional firewall tools and log analyzers to pinpoint threats to networks. This method was similar to finding the proverbial needle in a haystack and was labor intensive.

    Related Posts