Financial sector must be prepared for more sophisticated threats

Financial sector must be prepared for more sophisticated threats

The increased security measures that most financial organizations now have in place have caused hackers targeting the financial sector to up the ante, deploying more sophisticated malware.  This new breed of malware avoids detection by signature-based tools and is...
ProVision MSSP solution differentiators

ProVision MSSP solution differentiators

With so many SIEM tools and MSSPs out there, we understand that it can be very difficult to know which will be the best fit for your environment.  Here are some key differentiators of our proprietary ProVision solution that our clients find most valuable: ProVision is...
From MSP to MSSP – Is it that simple?

From MSP to MSSP – Is it that simple?

Managed Service Providers (MSPs) are addressing the changing needs of IT and their customers by becoming Managed Security Service Providers (MSSPs).  How easy is this transition, and what should both the MSPs and their client base keep in mind? There are a multitude...
Case Study:  Customized MSSP solution

Case Study: Customized MSSP solution

CASE STUDY:  A technology services provider in the financial sector had been using another MSSP to add security monitoring to the services they offer their clients, but they were having some struggles.  Since many MSSPs rebrand the SIEM tools they use, they...
True cost of SIEM (Security Information and Event Management)

True cost of SIEM (Security Information and Event Management)

While SIEM solutions can be great tools for detection of threats, they are not the right fit for everyone, as noted in Dark Reading’s “7 SIEM Situations That Can Sack Security Teams” article.  This is especially true for the SMB and mid-market...
So many logs, so little time.  Where do you focus?

So many logs, so little time. Where do you focus?

Under any framework, cybersecurity regulation, or security program an organization adheres to, there will be requirement for  logging, alerting and/or monitoring. This is to be expected as the third logical link in the security cycle is detection, and how do we...