Blog - Topic

Security operations

Incident Response and the Need for Speed

By
Chris Morales
September 30, 2020
Read blog post

Controlling Cyber-risk in Mergers and Acquisitions

By
Henrik Davidsson
September 21, 2020
Read blog post

How to Gain Full Threat Visibility Where Only the Network Exists

By
Henrik Davidsson
September 21, 2020
Read blog post

Why IDPS is Cumbersome and Hampers Security Personnel

By
Marcus Hartwig
August 25, 2020
Read blog post

Easily Track Expiring Certificates in Cognito Recall

By
Gearoid O Fearghail
August 20, 2020
Read blog post

Expertise That Unlocks the Potential within Your Security Operations

By
Matt Walmsley
July 21, 2020
Read blog post

SOC Maturity: Reactive, Proactive and Threat Hunting

By
Battista Cagnoni
July 20, 2020
Read blog post

Vectra and Microsoft Join Forces to Fulfill the SOC Triad

By
Marcus Hartwig
June 9, 2020
Read blog post

Remote work, not remote control

By
Marion Hennequin
March 25, 2020
Read blog post

Moving from Prevention to Detection with the SOC Visibility Triad

By
Marcus Hartwig
February 24, 2020
Read blog post

Expanding the "R" in NDR: Account Lockdown

By
Jose Malacara
February 13, 2020
Read blog post

NDRにおける”R”(対応手段)を拡大:Account Lockdown

By
Jose Malacara
February 13, 2020
Read blog post

Vectra SaaS Detections – Office 365

By
Vectra
February 11, 2020
Read blog post

Vectra製品のSaaS対応-Office 365

By
Vectra
February 11, 2020
Read blog post

Dridex resurfaces to open the door to credential theft

By
Marcus Hartwig
December 17, 2019
Read blog post

認証情報を盗難のリスクに晒すDridexが再浮上

By
Vectra
December 17, 2019
Read blog post

Chronicle integration: Conduct faster, context-driven investigations into active cyberattacks with Vectra and Chronicle

By
Jitin Dhanani
November 19, 2019
Read blog post

Swimlane integration: Automate response and speed remediation with Swimlane and Vectra

By
Jitin Dhanani
November 11, 2019
Read blog post

Forescout integration: Gain real-time visibility and automated response

By
Jitin Dhanani
November 4, 2019
Read blog post

Check Point integration: Gain continuous threat visibility and enforcement

By
Jitin Dhanani
October 28, 2019
Read blog post

M&A によるサイバーリスクのコントロール

By
Henrik Davidsson
October 2, 2019
Read blog post