Request a Demo
Welcome to the Cygilant Blog

4 Things to Think About When Buying Managed Detection and Response

Posted by Trevan Marden on Apr 20, 2018

If you are thinking of buying a managed detection and response (MDR) service, then you already know how these services can help your organization achieve security and compliance while reducing costs. These services can help by extending your team and offloading certain tasks related to security monitoring to a third-party, freeing up your team to better focus their efforts. But do you know what to look for in managed detection and response vendors? What sets some providers apart from others? Here are four important items to consider when buying an MDR:

5 Steps to Effective Threat Detection

Posted by Trevan Marden on Apr 13, 2018

Cyber attacks are waged against organizations of all sizes and industries. It is more critical than ever that these organizations find ways to effectively detect and mitigate threats. For organizations looking to build out their threat detection capabilities and avoid disaster, here are 5 steps to effective threat detection:

Three Things All MDR Services Have in Common

Posted by Miguel De Los Santos on Apr 9, 2018

At Cygilant, prospective customers are in constant research for what is a strong MDR, but there is little agreement in the industry for what makes a comprehensive MDR service. Before we go in-depth, do you remember this security acronym? If not, we have a handy refresher: What is Managed Detection and Response (MDR). In this blog post, we hope to advise you on the three most common components of any MDR. Feel free to include these components in your vendor matrices; the findings will surprise you.

5 Things an IDS/IPS Can’t Do

Posted by Lydia Dwyer on Mar 22, 2018

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have been touted as the cure-all to security and compliance woes. The most common type of system sits on the network and inspects all inbound packets. An IDS/IPS is designed to inspect incoming packets to see if they are part of a malicious attack and drop or alert on the packets which are. But like most technologies, IDS/IPS has numerous limitations and pitfalls that vendors of these systems don’t want you to know. When considering how best to protect your organization’s network and an IDS/IPS is in the running, you should consider the following five key limitations.

Thinking About Security as a Service? 7 Reasons Why It's Time to Stop!

Posted by Kevin Landt on Mar 15, 2018

Have you been thinking about using Security as a Service to supplement your team? If any of the statements below apply to your company, it’s time to stop thinking about it and start a new approach that incorporates Security as a Service into your operations.

Why Your Cyber Incident Response Matters

Posted by Trevan Marden on Mar 9, 2018

Cyber attacks frequently target personal and business data and it is critical to respond quickly to minimize the damage should a breach occur. Cyber incident responseincludes those plans and activities undertaken to identify, investigate, remediate, and assess damage and prevent further damage. It’s important for organizations to have a well-thought-out cyber incident response plan that includes detailed blueprints of the activities and owners for how your organization will respond to a security incident.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All