Blog - Topic

Security operations

Remote work, not remote control

By
Marion Hennequin
March 25, 2020
Read blog post

Moving from prevention to detection with the SOC triad

By
Marcus Hartwig
February 24, 2020
Read blog post

Expanding the "R" in NDR: Account Lockdown

By
Jose Malacara
February 13, 2020
Read blog post

Vectra SaaS detections – Office 365

By
Ethan Durand
February 11, 2020
Read blog post

Dridex resurfaces to open the door to credential theft

By
Marcus Hartwig
December 17, 2019
Read blog post

Chronicle integration: Conduct faster, context-driven investigations into active cyberattacks with Vectra and Chronicle

By
Jitin Dhanani
November 19, 2019
Read blog post

Swimlane integration: Automate response and speed remediation with Swimlane and Vectra

By
Jitin Dhanani
November 11, 2019
Read blog post

Forescout integration: Gain real-time visibility and automated response

By
Jitin Dhanani
November 4, 2019
Read blog post

Check Point integration: Gain continuous threat visibility and enforcement

By
Jitin Dhanani
October 28, 2019
Read blog post

Controlling cyber-risk in mergers and acquisitions

By
Henrik Davidsson
October 2, 2019
Read blog post

M&A によるサイバーリスクのコントロール

By
Henrik Davidsson
October 2, 2019
Read blog post

CrowdStrike, Splunk and Vectra – A powerful triad to find and stop cyberattacks

By
Ethan Durand
September 17, 2019
Read blog post

CrowdStrike、Splunk、Vectra AI社 – サイバー攻撃の検知と阻止に向けた、3社による強力な施策

By
Ethan Durand
September 17, 2019
Read blog post

Considerations when selecting your managed security services provider

By
Henrik Davidsson
August 22, 2019
Read blog post

マネージド・セキュリティサービスプロバイダーを選択する上での考慮点

By
Henrik Davidsson
August 22, 2019
Read blog post

Vectra and Nozomi Networks safely secure the IT/OT convergence

By
Henrik Davidsson
August 12, 2019
Read blog post

Notable insights from the Gartner Market Guide for Intrusion Detection and Prevention Systems

By
Kevin Sheu
July 23, 2019
Read blog post

Accelerate your cybersecurity with a managed detection and response service

By
Henrik Davidsson
June 20, 2019
Read blog post

How to gain visibility into attacker behaviors inside cloud environments

By
Chris Morales
June 10, 2019
Read blog post

How to gain full threat visibility where only the network exists

By
Henrik Davidsson
June 6, 2019
Read blog post

Don’t do it: Rolling your own production Zeek deployment

By
Rohan Chitradurga
May 15, 2019
Read blog post