<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

Datashield

Datashield

Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Recent Posts:

How Does Mimecast Work?

Mimecast is a cloud-based, anti-spam, and archive filtering service for securing email accounts and communications for businesses.

Citrix Vulnerability Mitigation (CVE-2019-19781)

This post is an informational announcement detailing the Citrix NetScaler Vulnerability and what Datashield is doing to help our customers detect and mitigate the issue. Since the announcement of the vulnerability in Citrix devices (CVE-2019-19781) Datashield has performed extensive analysis and research on exploit attempts, attack patterns, and the latest intelligence. Citrix released security bulletin CTX267027 containing information on a vulnerability in various Citrix Products. This allows an unauthenticated attack that allows remote code execution.

A Closer Look at LogRhythm XM for the Mid-Market

LogRhythm XM is a powerful yet compact version of LogRhythm Enterprise that is the perfect solution for many organizations in the mid-market. Learn more about the available all-in-one SIEM options and how Datashield helps companies successfully install and managed LogRhythm XM. The early days of tackling cyber threats involved a team of crack detectives diving through thousands of alerts produced by traditional firewall tools and log analyzers to pinpoint threats to networks. This method was similar to finding the proverbial needle in a haystack and was labor intensive.

Successful Password Policies for Organizations

Learn some of the basic considerations when establishing a strong password policy for your organization. Find out some of the best practices and industry standards when it comes to user access and a password policy framework. Most places of business require that their employees access their facilities by using a key or key card. In many ways, passwords are the keys by which employees access their workplace network. With physical office keys or card readers, proper policies and procedures must be implemented to ensure that unauthorized access does not occur. The same holds true with successful password policies for organizations.

HIPAA Compliance Overview

Learn the basics you need to know with HIPAA including the Privacy, Security and Breach Notification Rules. HIPAA Basics: What You Need to Know The Health Insurance Portability and Accountability Act (HIPAA) is a well-known piece of US legislation that is designed to provide organizations in health care with data privacy and security provisions for medical information. The original regulations were adopted in 1996 but since then they were amended with new legislation via the Privacy Rule of 2000, the Security Rule of 2003, the Health Information Technology for Economic and Clinical Health Act (HITECH) and the American Recovery and Reinvestment Act introduced in 2009 (ARRA).

Threat Hunting within Microsoft Azure Sentinel

Find out what sets apart Microsoft's new SIEM tool (Azure Sentinel) from the rest of the solutions in the marketplace. Take a deeper look at Threat Hunting within Azure Sentinel and five features that make Sentinel an effective tool for security teams rather they use Azure or not. As far as data breaches go, 2019 is shaping up to be a landmark year based on the findings of the 2019 MidYear QuickView report published by Risk Based Security.

Carbon Black & Azure Sentinel for Cloud Deployed Cyber Security Resilience

In this special announcement, DATASHIELD officially outlines its new partnerships with Carbon Black and Azure Sentinel as a unique cloud deployed pairing for cyber resilience. Datashield Pairs Carbon Black & Microsoft Azure Sentinel for a Cloud Deployed Cyber Security Resilience Solution

Carbon Black: Managed Endpoint Detection & Response (EDR)

Learn how Datashield provides managed Endpoint Detection & Response (EDR) utilizing Carbon Black's Predictive Security Cloud and leveraging the primary EDR tool CB Defense. VMware Carbon Black Endpoint Detection and Response Platform: Carbon Black is a suite of cloud-based security solutions that provides a variety of endpoint focused tools. Carbon Black labels this single agent, console and platform as the CB Predictive Security Cloud. At the core of Carbon Black’s endpoint security software is CB Defense. CB Defense serves as a next-gen antivirus (NGAV) as well as an endpoint detection and response (EDR) solution. CB Defense is a powerful tool that is easy to setup at a relatively affordable price point. Core features of CB Defense include the following:

Cyber Security as a Service

Take a Journey through SIEM Selection, Management and Threat Hunting via MDR Choosing The Right SIEM Solution Security Information and Event Management (SIEM) tools are an essential part of modern network security architecture. Not only is choosing the right solution important but properly implementing and managing the tool are critical for success. Protecting your organization from attack is not as simple as installing the hardware/software and letting it run. You must be active, diligent, and agile to keep your network secure.

    Related Posts

    Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

    Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    The Difference Between Cybersecurity & Network Security

    The Difference Between Cybersecurity & Network Security