Company Blog

Anonymous's picture
Written by
Deena Thomchick - Senior Director, Cloud Security

How Data science is used for monitoring cloud activity, data governance, and user behavior analysis in a CASB

Anonymous's picture
Written by
Deena Thomchick, Sr. Director, Cloud Security

Of course you should make the transition to Microsoft Office 365. You’ll cut costs and increase user productivity—painlessly. In fact 78% of all enterprises are already using it or planning to use it, and you can be sure Microsoft’s development focus will remain on Office 365 for years to come. But… before you make your move… take the necessary steps to strengthen your defenses.

Anonymous's picture
Written by
Deena Thomchick, Sr. Director, Cloud Security

Microsoft Office 365 is the #1 cloud-based solution on the planet because it has appeal on multiple levels. To executives, one of the leading reasons for adoption is the cost savings from lower licensing fees.

Anonymous's picture
Written by
, Alan Hall
There are two types of companies – those who have been hacked and realize it, and those who have been hacked and don’t know it  yet.
Anonymous's picture
Written by
Alan Hall, Director, Product Marketing for Security Analytics

For security professionals both old and new, Black Hat is a highly anticipated event. New research, solutions, techniques and vulnerabilities will all be making headlines throughout the week as cybersecurity professionals from around the world flock to Las Vegas.

Anonymous's picture
Written by
Alan Hall, Director, Product Marketing for Security Analytics

Enhancing Network Forensics and Incident Response with Automated Anomaly Detection

There’s simply too much going on across today's IT networks for information security and incident response teams to manually parse – a month, a week or even a day of complete network traffic can prove impossible to manually analyze.