<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

Datashield

Datashield

Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Recent Posts:

IBM QRadar

IBM-driven Security Intelligence Platform IBM QRadar is a foundational collection of SIEM applications used to accelerate and support virtually all possible aspects of a company’s overall security efforts. From vulnerability scanning and event log collection to post-incident forensics modules, IBM QRadar provides the advanced security tools, and intelligence teams need to detect advanced attack patterns and mitigate threats before any significant damage is caused to the network.

  • 4 min read
  • February 4, 2020 2:59:49 PM MST

Microsoft Office 365 Security

Microsoft-Native Email Security and Data Protection The Microsoft Office 365 Security & Compliance Center is an enterprise email security and data protection solution purpose-built for organizations who use Office 365 business products, Outlook, and Exchange servers alike. The Security & Compliance Center provides advanced email threat protection, data protection, policy management, and other cyber security and security management capabilities to ensure vulnerable attack vectors within an organization remain as protected as possible. Secure Communications Native Security Investigation and Response

  • 4 min read
  • January 1, 2020 1:49:00 AM MST

    Related Posts

    Bishop Fox

    Meet the leader in Offensive Security Bishop Fox is the largest private offensive security firm. Since 2005, the company has provided security consulting services to the world's leading organizations, working with Fortune 100 companies, to help secure their products, applications, networks, and cloud resources with penetration testing and security assessments.

    • 4 min read
    • March 19, 2021 2:13:14 PM MST

    ExtraHop

    ExtraHop leverages the cloud and provides enterprises with the ability to handle threat detection and mitigation tasks across hybrid infrastructure. Unlike traditional Security Information and Event Management (SIEM) solutions, ExtraHop applies a different approach to threat detection. The method is known as Network Detection and Response (NDR). The NDR approach involves the application of network traffic analysis to investigate anomalous behaviors and risk activities from layer two through layer seven.

    • 4 min read
    • August 7, 2020 12:59:49 PM MST

    Check Point: Next-Generation Firewall

    The fifth generation of cyber-attacks consists of large-scale multi-vector attacks aimed at crippling multiple components of an enterprise’s IT infrastructure. Dealing with these attacks requires a comprehensive solution that protects each gateway, device, and component within an IT architecture.

    • 5 min read
    • June 3, 2020 2:38:10 PM MST