<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

The case for Google Chronicle in a Supply Chain Attack

In light of the recent SolarWinds Orion “SUNBURST” Supply Chain attack, there is a strong use case for deploying Google Chronicle to protect your network and organization against a similar attack.

Best Practices for Vulnerability Management

One can broadly define vulnerability management as a set of processes and procedures to identify, analyze, and manage vulnerabilities across a critical service's operating environment.

What Makes a Best-in-Class Managed Detection and Response Provider?

Managed Detection and Response (MDR) service providers refer to companies that offer turnkey threat detection and response tools to end-users or security teams through security operations center technologies. MDR services protect cloud-based infrastructure, IT networks, cyber-physical systems, apps, devices, and on-premise assets. The managed security service providers offer round-the-clock monitoring to ensure security incidents can be detected in real-time and mitigated quickly.

On-Premise vs Cloud SIEM

The idea of collecting data from logs and using this data for analyzing the behavior of software applications, endpoints and servers dates back to the 80s. It took over a decade for the first Security Information and Event Management (SIEM) systems to appear as an on-premise security tool that collects logs from multiple collection points to detect abnormal activity.

The Packet Advantage

Learn why packet level detail and full packet capture are critical to the forensic capabilities of a security analyst. Listed below are the top 7 reasons why packets are superior to logs alone.

    Related Posts