Blog
SAO vs. SIEM: Not Enemies, But a Security Defending Duo
Thu, 05/21/2020
What threatens your system?
Blog
Security So Easy, A Sales Guy Can Do It
Thu, 05/21/2020
Much like how I complain that I’m not losing weight - even though my treadmill has become a clothing rack- security only works if you use it. And, yes, I know I picked on the sales guys (and girls) in the title but, your security has to be easy enough to use and understand that anyone in the organization can use it, no matter their level of security training. I have heard multiple reports from our...
Blog
Do I Need Identity Governance & Administration (IGA)?
Thu, 05/21/2020
Learn what you need to know about Identity Governance & Administration before investing in an IGA solution for your business.
Blog
How to Pen-Test with Core Impact
Thu, 05/21/2020
When conducting a penetration test, most testers will develop some type of process, and repeat that same process on every engagement. As I think through the basics of penetration testing, I believe that process can be broken up into six steps.
Now, I’m not saying every tester follows every step or performs these steps in this exact order, however, this is a pretty good process to follow. Let’s...
Blog
How to Solve the Top Three Struggles of Identity Governance and Administration
Thu, 05/21/2020
Identity Governance and Administration (IGA) is a complex and growing set of solutions that are put in place to help your organization stay compliant with government or industry regulations and, perhaps more importantly, help secure your organization.
However, with every new solution, there are a host of new problems. In working with our IGA customers, we keep seeing certain problems emerge so,...
Blog
Are Employees Undermining Your Data Breach Defenses from the Inside?
Thu, 05/21/2020
Protect Your System from Internal Threats
Blog
Three Challenges of Pen Testing
Thu, 05/21/2020
Ready to learn some new pen testing techniques?
Blog
How Phishing Has Evolved and Three Ways to Prevent Attacks
Thu, 05/21/2020
Ready to run your first anti phishing pen test?
Blog
Endpoint Antivirus Software: What It Is, and Why You Need It
Thu, 05/21/2020
Get Started with Virus Protection
Blog
A Full Body Scan: Protect Your Organization with Endpoint Antivirus Software
Thu, 05/21/2020
Start Protecting Your Servers Today
Blog
Cloud Watching: Ensuring Security in Every Cloud Environment
Thu, 05/21/2020
Want to learn more about preventing cloud misconfiguration?
Blog
Why Corporate Networks are Key Targets for Cryptojacking
Thu, 05/21/2020
Protect your environment from cryptominers.
Blog
Powertech Antivirus and ClamAV: A Detection Rate Comparison
Thu, 05/21/2020
Is there malware on your servers?
Blog
Top Content in Review: 2018's Most Read Cybersecurity Information by IT and Security Professionals
Thu, 05/21/2020
Want to learn more about keeping your organization safe?
Blog
Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
Thu, 05/21/2020
Want to see our SIEM solution in action?