Search results for:
-
Sep 4th, 2019
A ThreatConnect Customer Success Story: Creating an Efficient Reporting Workflow To and From the Security Operations Center
Find out how ThreatConnect helped a customer: Establish a streamlined communication process between the SOC and individual groups throughout the organization Improved the quality and amount of histori
-
Jul 22nd, 2019
Common & Best Practices for Security Operations Centers: Results of the 2019 SOC Survey
SANS recently surveyed their members in hopes to provide objective data to security leaders and practitioners who are looking to establish a SOC or optimize their existing SOCs. The most frequently ci
-
Feb 9th, 2019
ThreatConnect Powered by SAP HANA
The latest edition of the ThreatConnect platform is built on SAP’s ground-breaking in-memory computing technology to enable you to move at the same speed as your adversary. It has the same robust f
-
Feb 6th, 2019
From Reactive to Proactive: How to Avoid Alert Fatigue
Alert fatigue. As cybersecurity teams and technologies get better at detecting threats, they are also becoming more inundated with alerts, warnings, and notifications. As a result, IT and cybersecurit
-
Feb 4th, 2019
Fragmentation: The “Silent Killer” of Your Security Management Program
Extreme fragmentation of enterprise security people, processes, and technologies is contributing to the “Detection Deficit” between attackers and defenders reaching an all-time high and trending
-
Jan 27th, 2019
ThreatConnect and Qualys Vulnerability Management Solution
The ThreatConnect and Qualys Vulnerability Management (VM) integration allows users to query Qualys scan results from within the ThreatConnect platform. Creates tasks, indicators, and attributes in Th