Request a Demo
Welcome to the Cygilant Blog

4 Questions You Need to Ask About Managed Detection and Response

Posted by Trevan Marden on Jul 23, 2018

Managed detection and response helps solve the needs of organizations who lack resources and enables organizations to better detect and respond to threats. MDR services complement an organization’s own IT or security team to help provide the extra eyes for 24x7 coverage along with security expertise and guidance for remediating potential security incidents that are detected. However, not all services provide the same features. So, it’s important to ask these four questions when looking at managed detection and response solutions.

Are Managed Security Services Right for You?

Posted by Trevan Marden on Jul 6, 2018

Are you considering augmenting your internal resources with managed security services? Can’t decide if managed security services are a good fit for you? Here are few things to think about when considering adding a managed security service.

Overcoming Cybersecurity Challenges with Managed Security Services

Posted by Trevan Marden on Jun 27, 2018

An article on SecurityWeek this week announced the results of the IDC Worldwide and U.S. Comprehensive Security Services Forecast, which showed that managed security services is the largest and fastest-growing of the segments they covered. The article points to two key drivers of this growth: growing complexity of Security Operations and an overwhelming volume of security incidents.

3 Ways Integrating Vulnerability and Patch Management Helps Protect Data

Posted by Trevan Marden on May 11, 2018

So often the cause of the major breaches we see in the news is failure by the organization to patch a software vulnerability for which a patch has long been available. Hackers know organizations often lag months or longer on installing available patches and they take advantage of these gaps in your security to gain access and cause harm. Oftentimes this lag is because the organizations do not have the time, resources, or technology needed to effectively identify vulnerabilities and implement the necessary remediation.

Automation Can’t Replace Role of People in Security

Posted by Trevan Marden on May 8, 2018

This week, an article on DarkReading served as a good reminder that technology alone can only take us so far in the fight against cyber threats. The role of trained security staff cannot be simply replaced by automation.

Top 5 Things to Look For In Your Next SIEM Solution

Posted by Lydia Dwyer on Apr 25, 2018

Whether you already have a SIEM in place that’s not providing value or you’re looking for your first SIEM solution, we’ve put together a list of five things you should be sure to look for in your next SIEM solution. All too often, organizations purchase expensive SIEM technology without considering all the aspects necessary to make the SIEM deployment successful. The technology alone will end up as shelfware if you don’t have the trained staff to deploy and manage the solution, and a 24x7 SOC team to monitor and respond to potential incidents. It’s also important to integrate the SIEM into your overall security program and have a thorough plan for how you will respond to incidents. The combination of people, process, and technology are the key to a successful SIEM implementation that will help your organization reduce risk, prevent data breaches, and be compliant. Here are five things to look for in your next SIEM solution:

What Are The Vulnerability Scan Requirements for PCI?

Posted by Miguel De Los Santos on Apr 16, 2018

In this blog post, we will cover the vulnerability scan requirements for Payment Card Industry Data Security Standard (PCI DSS). The adoption of these requirements helps ensure that your environment is not only compliant with PCI regulations, but also meets best security practices. This vulnerability data can also help provide a deeper understanding of your environment and where time and attention needs to be spent.

Increase ROI with Managed Security Services

Posted by Trevan Marden on Apr 6, 2018

When resources are unlimited, you can afford wasteful spending. But for most organizations with limited IT budgets and too few staff, it’s important to invest your security spend wisely. This means finding the ways to stretch your dollar further and get better value out of your investments. You can’t afford to waste money on solutions that are never deployed or require staff you don’t have to manage.

4 Tips for Choosing a Managed Security Service

Posted by Kevin Landt on Mar 29, 2018

Using a managed security service can be a great way to gain enterprise-class security without making big investments in-house. For mid-size companies it can be especially attractive because it allows the existing IT team to be more efficient and productive without adding headcount.

3 Reasons to Look at Managed SIEM Services

Posted by Trevan Marden on Mar 23, 2018

SIEM (Security Information and Event Management) has been around a while and forms a pillar of many security programs, collecting and correlating data from a wide range of network devices to identify and alert on anomalous activity. This activity may indicate a potential attack or malicious actor posing a real threat to your network security. However, enterprise-class SIEM software products are advanced solutions and require constant tweaking and tuning of alerts to quiet unnecessary noise and provide actionable information on viable threats. These solutions require a team of staff to monitor alerts around the clock to interpret and respond to potential incidents. These solutions can also be very costly to purchase and deploy. However, managed SIEM services can avoid these hurdles and start delivering value to your organization almost immediately. If you’ve been putting off your SIEM projects because you don’t have enough staff or thought it would cost too much, you should consider a managed SIEM solution.  Here are three reasons to look at managed SIEM:

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All