SIEM
Featured Use Case: Why a Large US Utility Company Turned to MixMode to Address Utility Grid Vulnerabilities
A large utility company approached MixMode with the following scenario: The enterprise SOC was utilizing a shared SIEM application that was being utilized by several stakeholders: the networking team, the SCADA team, ...
Security Analytics and SIEM Best Practices
SIEM (Security Information and Event Management) and AI-Based Security Analytics is something of a match... The post Security Analytics and SIEM Best Practices appeared first on Gurucul ...
Introducing the Cloud Sensor for GCP
By Vijit Nair, Sr. Director, Product Management, Corelight Visibility is paramount in securing your cloud environment – as the adage goes, you cannot protect what you do not see. However, comprehensive visibility ...
Why SIEMs need threat intelligence to defeat Cyberthreats
Security professionals the world over crave compliance management and the ability to pull deep insights from their complex IT environments. This need was the catalyst for the initial adoption of security information ...
5 user behavioral patterns to look out for in a decentralized workspace
Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your employees wherever they’re located, and devise a ...
Featured Use Case: Why a Large Government Entity Replaced Their SIEM with MixMode
Despite a three-year SIEM deployment and a two-year UBA deployment, government personnel needed an alternative to better detect and manage threats in real-time, as well as an improved platform for gathering comprehensive ...
How Vendors Capitalize on SIEM’s Fundamental Flaws
Because the fundamental nature of SIEM requires infinite amounts of data, security teams are forced to constantly wrangle their network data and faced with an unmanageable number of false positive alerts. This ...
A Return to Logs to Unjam the Security Deficit
Some years ago, during the renaissance of security information and event management (SIEM), security became log crazy. The hope was that by gathering logs from networking and security devices and running them ...
The Case Against Using a Frankenstein Cybersecurity Platform
The cybersecurity market has, simply put, been cobbled together. A tangled web of non-integrated systems and alerts from siloed systems. Enterprises are now being forced to utilize a “Frankenstein” of stitched together ...
Improving on the Typical SIEM Model
Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One effective, comprehensive approach to network security pairs the best parts of SIEM ...

