Secure Thinking

Welcome to #CyberDraft2019

Continuing on our “basketball meets cybersecurity” theme, we now find ourselves around the corner from the NBA draft. Just as with our previous #Threat16 March Madness challenge - if you adopt the right perspective, there are so many unexplored parallels between cybersecurity and sports.

Customer Success – Improving Data Protection Through DLP Optimization

Nearly every enterprise must tackle significant requirements these days around data protection and evolution of related DLP capabilities, but those companies tasked with defending their lifeblood intellectual property face even greater DLP Optimization challenges. From insiders that may either intentionally or unintentionally leak their latest R&D or product secrets outside company “walls”, to persistent threats […]

Automated Threat Hunting and Response – Integrating Analytics and EDR

Newsflash – there will never be a one-size-fits-all solution when it comes to addressing  enterprise security requirements. At the same time, best practices shared among leading security practitioners will always shine a light on what’s working in terms of both emerging and proven techniques. To that end, building out capabilities that enable automated threat hunting […]

A Championship Performance: ICA Thwarts Unseen Data Loss in Cyber-security Title Tilt

Redemption.  Remember that word? The University of North Carolina claimed it back in 2017, and we thought we would share it with our ACC brethren Virginia this year after they got knocked out in the first-round last season (OK, so, that wasn’t really the plan here in Chapel Hill, but…). This year’s overtime thriller will […]

To download this document, please fill out the form below:

×
* Indicates required fields
I am interested in a product demonstration or trial
Please send me emails regarding product updates and availability