Blog

Securonix Delivers SearchMore at 50% (or More) Savings Compared To Splunk

Published on October 13, 2020

The Revolutionary Aspect of SearchMore By Augusto Barros, Vice President of Solutions So you are working on your security monitoring and log management architecture. You look at your requirements and see: The need to collect logs from certain log sources to support your threat detection use cases. Provide advanced analytics...

Zerologon and the Role of Monitoring in Vulnerability Management

Published on October 8, 2020

By Augusto Barros, Vice President of Solutions   Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control doesn't make it simple to successfully implement. I used to cover VM in my Gartner days,...

DDLC - Detection Development Life Cycle

Published on September 21, 2020

By Augusto Barros, Vice President of Solutions   Dr. Chuvakin has recently delivered another great blog post about "detection as code". I was glad to read it because it was the typical discussion we used have in our brainstorming conversations at Gartner. It had a nice nostalgic feeling :-). But it also...

NG SIEM?

Published on September 11, 2020

By Augusto Barros, Vice President of Solutions   An interesting result from changing jobs is seeing how people interpret your decision and how they view the company you’re moving to. I was happy to hear good feedback from many people regarding Securonix, reinforcing my pick for the winning car in...

I'm Joining Securonix

Published on August 31, 2020

By Augusto Barros, Vice President of Solutions, Securonix   I’m very happy to announce today I’m starting my journey with Securonix! I’ve spent the last five years working as an industry analyst, talking to thousands of clients and vendors about their challenges and solutions on security operations. During this time...

What's New in Securonix 6.3.1

Published on August 20, 2020

Have you noticed an uptick in ransomware recently? Ransomware is commonly delivered by an email that tricks users into trusting a malicious file. Many of the most recent data breaches were initiated because a user fell victim to ransomware. Threats like ransomware, which focuses on compromising the user, have more...

Threat Hunting: Do lower search costs produce better results?

Published on August 19, 2020

Intellyx BrainBlog for Securonix by Jason English   Companies now expect to acquire security tools on a pay-as-you go, OpEx basis, and vendors who didn’t start out as managed service providers are now trying to adapt their pricing models to more flexible ones for Hybrid IT environments. Maintaining premium pricing...

3 Proactive Ways to Find Hidden Threats: SearchMore

Published on August 7, 2020

What if the enemy is already inside? In the SecOps world, detecting and responding to threats is only half the story. Sophisticated attackers know the weaknesses of SIEM platforms and other security software and will exploit those vulnerabilities every chance they get. Threat actors know that many legacy platforms can’t...

Always Secure the Money – SWIFT Financial Security

Published on July 17, 2020

SWIFT is the primary method by which banks and financial institutions around the globe move money between one another. Swift has been in existence for over 40 years, and has had its share of high-profile security issues. As a consequence, SWIFT has been at the forefront of developing security and...

Insider Threat – Is your organization at risk?

Published on July 16, 2020

With the ongoing pandemic, companies have increasingly adopted work from home policies for most of their employees, contractors, suppliers, and partners. This digital transformation provides the flexibility to work from anywhere, but it doesn’t come without a risk. Insider threats are a looming security concern for many organizations today. Insider...