NSFOCUS Recognized in Groundbreaking AI Security Industry Map

NSFOCUS Recognized in Groundbreaking AI Security Industry Map

| | AI, AISecOps, Blog, NSFOCUS ISOP, Press Releases
Beijing, China, September 18, 2024 – At the National Cybersecurity Awareness Week, the Cloud Security Alliance (CSA) Greater China Region unveiled the industry’s first-ever AI-empowered security map: AI Security Industry Map, 2024 ...
NSFOCUS Named a Leader for Its ISOP in IDC MarketScape for China’s Extended Detection and Response (XDR) Platform Vendor Assessment

NSFOCUS Named a Leader for Its ISOP in IDC MarketScape for China’s Extended Detection and Response (XDR) Platform Vendor Assessment

SANTA CLARA, Calif., July 01, 2024 — IDC, a leading global IT market research and consulting company, recently released IDC MarketScape: China’s Extended Detection and Response Platform 2024 Vendor Assessment (Doc# CHC51540824, ...
NSFOCUS Recognized as One of Representative SOAR Vendors in Frost & Sullivan’s Report

NSFOCUS Recognized as One of Representative SOAR Vendors in Frost & Sullivan’s Report

| | Blog, NSFOCUS ISOP, Press Releases
SANTA CLARA, Calif., Dec 21, 2023 – NSFOCUS proudly announces its recognition in Frost & Sullivan’s latest report Insights for CISOs: Modernizing Security Operations Centers with Security Orchestration and Automated Response as ...
Two Use Cases of NSFOCUS AISecOps

NSFOCUS AISecOps: Elevating Your Security Operations Efficacy and Mitigating Alert Fatigue

| | Blog, NSFOCUS ISOP
In the realm of security operations, enterprises often face challenges such as a high volume of alerts, an inability to pinpoint real threats, insufficient security knowledge, and a lack of operational staff ...
Mastering Defense and Understanding Offense: Approach of Detecting Abnormal Attack Behaviors

Mastering Defense and Understanding Offense: Approach of Detecting Abnormal Attack Behaviors

| | Blog, NSFOCUS ISOP
In offensive and defensive exercises, attackers will use various attack methods to maximize their objectives, including not only common attack methods but also complex attacks. Phishing email is popular among attackers as ...