<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

Datashield

Datashield

Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Recent Posts:

Fortinet FortiGate: Next Generation Firewall

Enterprise Network Protection and Threat Prevention Fortinet’s FortiGate next-generation firewalls (NGFW) provide organizations supreme protection against web-based network threats, including known and unknown threats and intrusion strategies. Deployed on-premise, through virtual hardware, or in the cloud, FortiGate firewalls seamlessly integrate with FortiGuard Labs security services to extend and strengthen an enterprise’s overall security efforts from network edge to core.

  • 4 min read
  • March 2, 2020 10:22:52 AM MST

Cisco Firepower: Next-Generation Firewall

Award-Winning Firewall Appliances and Enterprise Network Protection Cisco Networks Firepower Next-Generation Firewalls (NGFW) offer superior cyber threat protection, intrusion prevention, and enterprise security management controls for organizations of all sizes and deployments. As one of the most recognized brands and security appliances in the industry, Cisco Networks and its Firepower NGFWs provide foundational security architecture and functionality to ensure any organization’s overall security posture remains as strong and as effective as possible against future generations of cyber security threats.

  • 4 min read
  • March 2, 2020 10:17:03 AM MST

Recorded Future

A universal threat intelligence solution Recorded Future's threat intelligence platform allows teams to reduce research time, respond confidently, and understand relevant risks. Their product works by analyzing technical, open web, and dark web threat sources, visualizing them for teams and integrating with products like SIEM, SOAR, and GRC.

  • 3 min read
  • March 2, 2020 10:09:05 AM MST

Crowdstrike

Advanced Endpoint Detection and Response Recognized as one of the most powerful and trusted names in the cybersecurity industry, the Crowdstrike Falcon platform delivers state-of-the-art endpoint detection and response (EDR) capabilities that give organizations complete security coverage and deep visibility into each and every network endpoint in real time. Such rich insight provided by Crowdstrike allows security personnel to automatically detect advanced threats and respond with the resources necessary to keep critical company assets protected at all times. Whereas traditional EDR solutions rely on signature-based attacks (and therefore vulnerable to silent failure), Crowdstrike’s Falcon Insight EDR solution leverages real-time monitoring capabilities and behavioral analysis techniques to unearth malicious activity before it can compromise the network. In fact, Falcon Insight EDR module has been repeatedly noted by Gartner as being a leader in the endpoint protection space, both in terms of vision and ability to execute. Next-gen Endpoint Protection Falcon Platform Integration Granular Endpoint Visibility Ultra Low Performance Impact Next-gen Endpoint Protection Crowdstrike gives organizations the capability to detect fileless attacks and highly advanced threats without the need for constant updates or resource-sapping system scans. Falcon Platform Integration Catering to the needs of virtually any organization, each Crowdstrike security module can work as a standalone security tool or as a part of the greater Crowdstrike Falcon platform suite. Granular Endpoint Visibility Crowdstrike provides deep visibility into the usage data of each company endpoint, giving security teams copious and relevant data needed to quickly and confidently engage emerging threats. Ultra Low Performance Impact Crowdstrike’s endpoint agents are extremely lightweight and cause virtually zero impact on device performance, even while actively collecting data. Crowdstrike Falcon Overview Crowdstrike Falcon Insight Serving as the core EDR module in the Crowdstrike Falcon platform, Falcon Insight provides supreme company endpoint protection by continuously monitoring endpoint activity to catch intelligent threats as they emerge. The event data pulled from company endpoints are then streamed to the Falcon platform where security teams can engage with the threat as well as hunt for new network threats with the necessary information. Lightweight agent (20MB footprint) IOA behavioral protection Alert prioritization Real-time data capture for 200+ events Crowdstrike Falcon Prevent Crowdstrike Falcon Prevent is a next-gen antivirus product designed specifically to fix efficiency gaps and security vulnerabilities inherent with legacy AV solutions as well as provide superior threat protection for critical company assets. Deployed in just minutes, Falcon Prevent has the ability to stop fileless malware threats, in-memory attacks, and other intelligent threats that would have otherwise gone unnoticed by other AV products. Online and offline protection Machine learning and behavioral analytics Signatureless protection technology Single agent deployment Crowdstrike Falcon Device Control Crowdstrike Falcon Device Control gives organizations complete visibility into and control over employee devices, allowing administrators to enforce proper usage and maintain peak security at all times. Serving as one of the cybersecurity industry’s only cloud-delivered device control and management solutions to date, Falcon Device Control allows security teams to effectively implement security policies as well as detect and monitor network endpoints to ensure no unauthorized devices can connect and/or pose a threat to sensitive company assets. Automatic device discovery Analytics/device usage dashboard Preview policy impact before deployment Online and offline policy enforcement Monitor files written to storage

  • 5 min read
  • March 1, 2020 2:02:00 AM MST

Digital Shadows

Taking threat intelligence to the next level Digital Shadows’ SearchLight threat intelligence platform offers a wide variety of data sources, contextualization of alerts, playbooks, and integrations for turnkey automated remediation.

  • 4 min read
  • February 28, 2020 2:38:24 AM MST

Microsoft Defender Advanced Threat Protection

Discover vulnerabilities and in real-time Microsoft, it's the name you know. The tech giant also provides a complete endpoint detection and response platform deployed in the cloud. Microsoft ATP has been named a leading endpoint protection service by Gartner in 2019 for its cloud security analytics, threat intelligence capabilities, endpoint behavioral sensors, and automation.

  • 6 min read
  • February 28, 2020 2:09:53 AM MST

Nessus Vulnerability Scanner

Meet the next generation of vulnerability assessment Tenable®, Inc. has produced one of the most popular vulnerability scanners on the market, Nessus. Their scanner is available to organizations of all sizes and provides advanced threat detection, vulnerability scanning, scalability, and vulnerability management. Organizations can deploy Nessus to conduct penetration testing and comprehensive analysis of vulnerabilities across communication channels, online portals, and IT infrastructure.

  • 3 min read
  • February 28, 2020 1:02:24 AM MST

Anomali

A threat intelligence platform utilizing machine learning and optimized threat intelligence Anomali provides a variety of products and services that work in tandem to provide threat intelligence, detect threats, automate normalization of data, visualize IOCs, and facilitate collaboration.

  • 5 min read
  • February 28, 2020 12:26:22 AM MST

    Related Posts

    Bishop Fox

    Meet the leader in Offensive Security Bishop Fox is the largest private offensive security firm. Since 2005, the company has provided security consulting services to the world's leading organizations, working with Fortune 100 companies, to help secure their products, applications, networks, and cloud resources with penetration testing and security assessments.

    • 4 min read
    • March 19, 2021 2:13:14 PM MST

    ExtraHop

    ExtraHop leverages the cloud and provides enterprises with the ability to handle threat detection and mitigation tasks across hybrid infrastructure. Unlike traditional Security Information and Event Management (SIEM) solutions, ExtraHop applies a different approach to threat detection. The method is known as Network Detection and Response (NDR). The NDR approach involves the application of network traffic analysis to investigate anomalous behaviors and risk activities from layer two through layer seven.

    • 4 min read
    • August 7, 2020 12:59:49 PM MST

    Check Point: Next-Generation Firewall

    The fifth generation of cyber-attacks consists of large-scale multi-vector attacks aimed at crippling multiple components of an enterprise’s IT infrastructure. Dealing with these attacks requires a comprehensive solution that protects each gateway, device, and component within an IT architecture.

    • 5 min read
    • June 3, 2020 2:38:10 PM MST