Blog

Effective Multi-Cloud Security Monitoring With Federated SIEM

Published on October 23, 2020

As more and more organizations move their infrastructure and IT services to the cloud, it is common to find questions about how to address multi-cloud and other hybrid scenarios when designing a security monitoring solution. Although a real SaaS SIEM can easily ingest data from multiple locations in a simple,...

Security Monitoring for the Top 10 AWS Threats

Published on October 22, 2020

Computing? Check. Analytics? Check. Artificial intelligence (AI)? Check. Networking? Check. Content delivery network? Check. Storage? Check. Load balancing? Check. Third party applications? Check. Robotics? Check. Quantum computing? Check. The array of capabilities that AWS offers today is mind-boggling. A self-sufficient, feature rich cloud environment, AWS makes it very easy to...

Consumer Privacy in California: CCPA Compliance With Securonix

Published on October 21, 2020

In 2018, California recognized that its citizens should have stronger control over their personal information and privacy, and created the California Consumer Privacy Act (CCPA), which gives California citizens several rights with respect to their personal data and its privacy. As of July 2020, enforcement of the CCPA began in...

Securonix Delivers SearchMore at 50% (or More) Savings Compared To Splunk

Published on October 13, 2020

The Revolutionary Aspect of SearchMore By Augusto Barros, Vice President of Solutions So you are working on your security monitoring and log management architecture. You look at your requirements and see: The need to collect logs from certain log sources to support your threat detection use cases. Provide advanced analytics...

Zerologon and the Role of Monitoring in Vulnerability Management

Published on October 8, 2020

By Augusto Barros, Vice President of Solutions   Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control doesn't make it simple to successfully implement. I used to cover VM in my Gartner days,...

DDLC - Detection Development Life Cycle

Published on September 21, 2020

By Augusto Barros, Vice President of Solutions   Dr. Chuvakin has recently delivered another great blog post about "detection as code". I was glad to read it because it was the typical discussion we used have in our brainstorming conversations at Gartner. It had a nice nostalgic feeling :-). But it also...