<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Announcing Our New Product Management Team

mike-web-500Jeff Marshall, Chief Information Security Office (CISO) at Datashield announces the new Product Management Team.

I am pleased to announce that Mike Heller has accepted a new position directing the Product Management team focused on our partners and vendors.

We are excited to continue growing our organization and providing continued high-touch service. Datashield continues to grow and add services for other partners including:

  • Microsoft Azure Sentinel
  • Mimecast
  • Proofpoint
  • Splunk
  • LogRhythm
  • Carbon Black
  • Crowdstrike
  • Sumo Logic

All this along with our newly developed Vulnerability Management services. In his new role, Mike will be leading the efforts in managing these relationships.

Topics from this Article

Announcement, Press Release

Jeff Marshall
Jeff Marshall
Jeff Marshall was the previous Chief Information Security Officer at Datashield and contributed technical content to the Datashield resource library. Jeff worked at Datashield for nearly 4 years and provided thought leadership and educational content for the Datashield resource library.

Related Posts

What is Microsoft Defender for Endpoint and How Does it Work?

Microsoft Defender for Endpoint, formerly known as Microsoft Defender Advanced Threat Protection, provides enterprise-level protection to endpoints to prevent, detect, investigate, and respond to advanced threats.

What is the Zero Trust Framework?

Zero Trust security concept is a model and framework developed by former Forrester analyst John Kindervag in 2010. Since then, the Zero Trust model is widely adopted, with leading researchers at Gartner, Microsoft, and Google all developing and implementing their variations of Zero Trust frameworks while keeping the core concept intact.

Behavioral Indicators of Insider Threat Activity

Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and managers aside, an insider threat could be a former employee who had access to specific information, a third-party consultant, or a business partner.