<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

VIDEO: Remote Workforce Roundtable Interview with Paul Jakobsen of Proofpoint

The full interview with Paul Jakobsen, North American Channel Manager at Proofpoint an enterprise email security focused cybersecurity solutions provider. The interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

Malwarebytes Overview

The ever-changing threat landscape that enterprise infrastructure endpoints face requires a comprehensive solution to discover, categorize, and respond to both old and new threats. Malwarebytes delivers dynamic endpoint security to combat this. It provides the following features to discovering and responding to cyber threats:

VIDEO: Remote Workforce Roundtable Interview with Amy Blackshaw of RSA Security

The full interview with Amy Blackshaw, CISSP, the Director of Product Marketing at RSA Security. We focus on the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

VIDEO: Remote Workforce Roundtable Pt. 2 - Endpoint Security & EDR

In part one of our Remote Workforce Roundtable, we spoke to the larger cybersecurity trends at hand with remote working and security vulnerabilities. This time I sat down with Greg Foss from VMware Carbon Black for a more endpoint-focused discussion on remote work.

The Benefits of NGAV and EDR for Remote Users

In this new remote workforce world we now find ourselves in, the threat landscape has shifted once more. For many organizations this if the first time that they find their workers outside the comfort of the office and its security safeguards and thrust into the unknown of the home office life. This shift opens new areas of vulnerability to organizations that they have not had to face before. The change to a remote workforce is stretching security professionals and requires that they are able to maintain the same level of protection remotely that they had previously been providing within the office environment for their users.

What is Tanium Threat Response and How Does it Work?

Malicious actors attack an end-user device every 30 seconds and their arsenal of hacking tools is growing increasingly sophisticated and hard to detect. 

What is Tanium Reveal and How Does it Work?

Enterprises of all scales and industries produce and manage sensitive data for both internal use and to share with vendors and customers. Tracking, storing and protecting sensitive data against exposure is a matter of corporate ethics and regulatory compliance as data protection regulations become stricter.

What is Tanium Protect and How Does it Work?

Whether your organization needs to secure a handful or hundreds endpoints the proper configuration of their security is what protects your organization against cyber-attacks.

Managed Detection and Response for the Microsoft Cloud

Datashield has been servicing customers on Microsoft Azure Sentinel since its release. We have gained in-depth knowledge and expertise around the forensic analysis of the platform.

ExtraHop Overview

ExtraHop is a network detection and response platform that leverages cloud-scale machine learning to deliver complete visibility into networks, real-time detection, and intelligent response.

    Related Posts