<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

On-Premise vs Cloud SIEM

The idea of collecting data from logs and using this data for analyzing the behavior of software applications, endpoints and servers dates back to the 80s. It took over a decade for the first Security Information and Event Management (SIEM) systems to appear as an on-premise security tool that collects logs from multiple collection points to detect abnormal activity.

Why UEBA Software is Necessary for the Remote Workforce

When an organization has a highly remote workforce or shifts its operations to remote working, even temporarily, they could be opening their network to many risks. One way to mitigate them is by implementing UEBA software. UEBA stands for User and Event Behavior Analytics or User and Entity Behavior Analytics, depending on who you ask.

Partner Digest: Week of 4/13/20 - What's new with our partners?

Datashield Partner Digest for the Week of April 13th, 2020 - Highlights: COVID-19 Response, VMware Carbon Black Acquisition and New SIEM Gartner Magic Quadrant

FortiSIEM Overview

The complexities of security management across enterprise estates consisting of virtual machines, cloud, endpoints, and IoT devices require a cybersecurity solution that protects expansive IT infrastructure.

A Closer Look at LogRhythm XM for the Mid-Market

LogRhythm XM is a powerful yet compact version of LogRhythm Enterprise that is the perfect solution for many organizations in the mid-market. Learn more about the available all-in-one SIEM options and how Datashield helps companies successfully install and managed LogRhythm XM. The early days of tackling cyber threats involved a team of crack detectives diving through thousands of alerts produced by traditional firewall tools and log analyzers to pinpoint threats to networks. This method was similar to finding the proverbial needle in a haystack and was labor intensive.

Threat Hunting within Microsoft Azure Sentinel

Find out what sets apart Microsoft's new SIEM tool (Azure Sentinel) from the rest of the solutions in the marketplace. Take a deeper look at Threat Hunting within Azure Sentinel and five features that make Sentinel an effective tool for security teams rather they use Azure or not. As far as data breaches go, 2019 is shaping up to be a landmark year based on the findings of the 2019 MidYear QuickView report published by Risk Based Security.

Carbon Black & Azure Sentinel for Cloud Deployed Cyber Security Resilience

In this special announcement, DATASHIELD officially outlines its new partnerships with Carbon Black and Azure Sentinel as a unique cloud deployed pairing for cyber resilience. Datashield Pairs Carbon Black & Microsoft Azure Sentinel for a Cloud Deployed Cyber Security Resilience Solution

11 Reason RSA NetWitness 11.x SIEM Enhances Customer Threat Detection & Response

Datashield and RSA have a long history, dating back to 2009. RSA NetWitness continues to be a preferred SIEM solution for many of our clients. The platform is especially powerful for utilizing full packet capture, which allows our analysts to perform in-depth forensic investigations. The one downside we hear from many is that RSA NetWitness can be challenging to navigate and configure. Our long partnership gives us unparalleled service and knowledge to the clients we serve using the RSA platform. Over the past 12 months, RSA has made strides in developing the RSA NetWitness Platform into a more evolved and user-driven SIEM that provides security monitoring, detection, and investigation tools under a single unified platform. RSA has released new innovative capabilities, a redesigned user experience, and invested more in the core functionality to increase the speed of detection and response to threats.

Cyber Security as a Service

Take a Journey through SIEM Selection, Management and Threat Hunting via MDR Choosing The Right SIEM Solution Security Information and Event Management (SIEM) tools are an essential part of modern network security architecture. Not only is choosing the right solution important but properly implementing and managing the tool are critical for success. Protecting your organization from attack is not as simple as installing the hardware/software and letting it run. You must be active, diligent, and agile to keep your network secure.

Managed Detection & Response Synopsis

Outlined below is a brief synopsis of what MDR is, how it is different and valuable as well as how it is delivered. What is MDR? MDR (Managed Detection and Response) is the ability to focus on a true threat instead of millions of alerts and notifications from various tools. MDR providers deliver services for buyers looking to implement or improve their threat detection, response, and continuous-monitoring capabilities.

    Related Posts

    Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

    Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    The Difference Between Cybersecurity & Network Security

    The Difference Between Cybersecurity & Network Security