Request a Demo
Welcome to the Cygilant Blog

Top 5 Things to Look For In Your Next SIEM Solution

Posted by Lydia Dwyer on Apr 25, 2018

Whether you already have a SIEM in place that’s not providing value or you’re looking for your first SIEM solution, we’ve put together a list of five things you should be sure to look for in your next SIEM solution. All too often, organizations purchase expensive SIEM technology without considering all the aspects necessary to make the SIEM deployment successful. The technology alone will end up as shelfware if you don’t have the trained staff to deploy and manage the solution, and a 24x7 SOC team to monitor and respond to potential incidents. It’s also important to integrate the SIEM into your overall security program and have a thorough plan for how you will respond to incidents. The combination of people, process, and technology are the key to a successful SIEM implementation that will help your organization reduce risk, prevent data breaches, and be compliant. Here are five things to look for in your next SIEM solution:

What Are The Vulnerability Scan Requirements for PCI?

Posted by Miguel De Los Santos on Apr 16, 2018

In this blog post, we will cover the vulnerability scan requirements for Payment Card Industry Data Security Standard (PCI DSS). The adoption of these requirements helps ensure that your environment is not only compliant with PCI regulations, but also meets best security practices. This vulnerability data can also help provide a deeper understanding of your environment and where time and attention needs to be spent.

Increase ROI with Managed Security Services

Posted by Trevan Marden on Apr 6, 2018

When resources are unlimited, you can afford wasteful spending. But for most organizations with limited IT budgets and too few staff, it’s important to invest your security spend wisely. This means finding the ways to stretch your dollar further and get better value out of your investments. You can’t afford to waste money on solutions that are never deployed or require staff you don’t have to manage.

4 Tips for Choosing a Managed Security Service

Posted by Kevin Landt on Mar 29, 2018

Using a managed security service can be a great way to gain enterprise-class security without making big investments in-house. For mid-size companies it can be especially attractive because it allows the existing IT team to be more efficient and productive without adding headcount.

3 Reasons to Look at Managed SIEM Services

Posted by Trevan Marden on Mar 23, 2018

SIEM (Security Information and Event Management) has been around a while and forms a pillar of many security programs, collecting and correlating data from a wide range of network devices to identify and alert on anomalous activity. This activity may indicate a potential attack or malicious actor posing a real threat to your network security. However, enterprise-class SIEM software products are advanced solutions and require constant tweaking and tuning of alerts to quiet unnecessary noise and provide actionable information on viable threats. These solutions require a team of staff to monitor alerts around the clock to interpret and respond to potential incidents. These solutions can also be very costly to purchase and deploy. However, managed SIEM services can avoid these hurdles and start delivering value to your organization almost immediately. If you’ve been putting off your SIEM projects because you don’t have enough staff or thought it would cost too much, you should consider a managed SIEM solution.  Here are three reasons to look at managed SIEM:

5 Things an IDS/IPS Can’t Do

Posted by Lydia Dwyer on Mar 22, 2018

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have been touted as the cure-all to security and compliance woes. The most common type of system sits on the network and inspects all inbound packets. An IDS/IPS is designed to inspect incoming packets to see if they are part of a malicious attack and drop or alert on the packets which are. But like most technologies, IDS/IPS has numerous limitations and pitfalls that vendors of these systems don’t want you to know. When considering how best to protect your organization’s network and an IDS/IPS is in the running, you should consider the following five key limitations.

Thinking About Security as a Service? 7 Reasons Why It's Time to Stop!

Posted by Kevin Landt on Mar 15, 2018

Have you been thinking about using Security as a Service to supplement your team? If any of the statements below apply to your company, it’s time to stop thinking about it and start a new approach that incorporates Security as a Service into your operations.

5 Things to Look for in a Security-as-a-Service Provider

Posted by Trevan Marden on Mar 2, 2018

Information security is becoming a competitive advantage in many industries, with companies that can be trusted with financial data and personal information becoming better able to attract and retain customers and partners. Security as a service allows resource-constrained organizations to keep a level playing field with larger enterprises. Instead of a large upfront fixed cost for software such as SIEM, personnel hiring and professional integration services, security as a service spreads those costs over the subscription period. This model can provide more flexibility when budgeting IT expenditures. The scarcity of trained security professionals makes hiring trained staff in-house difficult. With security as a service, you can often receive around-the-clock security coverage for less than the cost of staffing one shift in-house.

MacOS Patch Management

Posted by Trevan Marden on Jan 18, 2018

We’re excited to announce that our patch support has been extended to MacOS. The Cygilant Patch Management service now covers Windows, Linux, Mac and applications like Adobe, Java, and the leading web browsers.

You Know You Need a Dedicated Cybersecurity Team, Now What?

Posted by Kevin Landt on Nov 29, 2017

Are you looking to take your cybersecurity program to the next level? One of the most important steps in maturing your security program is moving to a dedicated team responsible for managing cyber risk.

Many organizations try to get by with someone on the IT team wearing the security hat. However, most recognize that this is only a temporary stage that will need to be addressed for several reasons:

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All