Company Blog

Anonymous's picture
Written by
Deena Thomchick, Sr. Director, Product Marketing for Cloud Security

Of course you should make the transition to Microsoft Office 365. You’ll cut costs and increase user productivity—painlessly. In fact 78% of all enterprises are already using it or planning to use it, and you can be sure Microsoft’s development focus will remain on Office 365 for years to come. But… before you make your move… take the necessary steps to strengthen your defenses.

Anonymous's picture
Written by
Deena Thomchick, Sr. Director, Product Marketing for Cloud Security

Microsoft Office 365 is the #1 cloud-based solution on the planet because it has appeal on multiple levels. To executives, one of the leading reasons for adoption is the cost savings from lower licensing fees.

Anonymous's picture
Written by
, Alan Hall
There are two types of companies – those who have been hacked and realize it, and those who have been hacked and don’t know it  yet.
Anonymous's picture
Written by
Alan Hall, Director, Product Marketing for Security Analytics

For security professionals both old and new, Black Hat is a highly anticipated event. New research, solutions, techniques and vulnerabilities will all be making headlines throughout the week as cybersecurity professionals from around the world flock to Las Vegas.

Anonymous's picture
Written by
Alan Hall, Director, Product Marketing for Security Analytics

Enhancing Network Forensics and Incident Response with Automated Anomaly Detection

There’s simply too much going on across today's IT networks for information security and incident response teams to manually parse – a month, a week or even a day of complete network traffic can prove impossible to manually analyze.

Peter Doggart's picture
Written by
Peter Doggart

Since the launch of the Blue Coat Encrypted Traffic Management ecosystem program (ETM Ready) in March 2015, we have successfully collaborated with security vendors of all sizes and in all market categories to create a workable solution to the challenge of managing the increasing usage of SSL/TLS traffic in enterprise networks that, when not effectively addressed, causes a huge blind spot for the security infrastructure and dramatically increases risk of advanced threats and data exfiltration.