Let's Talk
Welcome to the Cygilant Blog

How EiQ's Customers Benefit From Our Affordable, Effective Security As A Service

Posted by Security Steve on Jul 26, 2016

 

EiQ’s affordable, effective hybrid security as a service transforms how mid-market organizations build enterprise-class security programs. Acting as an extension of our customers’ IT teams, EiQ provides continuous security operations based on best-of-breed technology at a fraction of the cost of alternate solutions. EiQ is a trusted advisor to organizations that need to improve their IT security and compliance posture and protect against cyber threats and vulnerabilities. Here are just a handful of the organizations we’re proud to call customers:

Transforming IT Security at Mid-Market Organizations

Posted by Security Steve on Jan 5, 2016

If you are like most IT professionals these days, you are no doubt juggling an increasingly complex security landscape while struggling to stay up-to-date with the latest tools and techniques.

 

This can add up to an incredible amount of unproductive time. In fact, according to IDC, 35% of organizations spend more than 500 hours a month just reviewing security alerts, and The Ponemon Institute has revealed that some organizations waste a staggering 395 hours per week on average just investigating false positives!

 

You’ve Found Your SaaS – Now what? Top 3 Things You Need to Prepare

Posted by Security Steve on Jun 26, 2015


You’ve made a decision.  You did your research.  You reviewed the analyst reports, you talked to colleagues and probably read dozens of white papers or buyer’s guides all about the benefits of outsourcing your security (SaaS). You want to commit. Congratulations! But much like any relationship, you need to be 100% ready and prepared if you want your SaaS partnership to be a raging success.  You need to know what you want and don’t want.  So, how do you get started? 

Security Spring Cleaning

Posted by Security Steve on May 22, 2015


Spring has sprung. The snow has melted and baseball season is underway.  It’s time to clear out the cobwebs, both literally and figuratively. And if Martha Stewart has any say about it, it’s time for a household’s typical spring cleaning involves clearing out closets, de-cluttering cabinets, and getting everything clean and shiny. But that’s not all that might need attention.  The National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) say now is the perfect time for a “digital spring cleaning.”

 

In fact, they have offered up a laundry list of tips that are great reminders for all.  We’ve included a couple, plus a few of our own.

Security as a Service

Posted by Security Steve on May 15, 2015

One of the most anticipated information security industry reports has got to be Verizon’s annual Data Breach Investigations Report (DBIR). Released this month, it dissected thousands of confirmed data breaches and security incidents from around the globe into emergent and shifting trends.  (If you haven’t downloaded the complete report, we definitely encourage you to do so.)

SANs In Your SOCs

Posted by Security Steve on Apr 17, 2015

Ironically, whether you are an IT professional or not, security, cyber risk and data breaches have hit the mainstream.  Recent headlines show that “Data security breaches have only gotten larger, more frequent and more costly. The average total cost of a data breach to a company increased 15 percent this year from last year, to $3.5 million per breach, from $3.1 million.”
 
Rather than becoming another statistic, companies are taking action and learning how to cut the possibility of risk down significantly with the right controls in place.  There are plenty of control sets on the market today. Security controls are safeguards and counteract or minimize security risks relating to digital property. They focus on technical aspects of information security with the primary goal of helping organizations prioritize and automate their efforts to defend against the most common and damaging insider and outsider attacks.

SOC Expectations

Posted by Security Steve on Jan 19, 2015

2014 was a banner year for data breaches.  It really did seem as though every day a new story hit the press regarding another data breach.  And company size and sector didn’t matter.  All organizations were vulnerable to external attack, and the consequences were certainly derailing companies and their leaders' careers.  Clearly, current methods have become ineffective for proactive awareness and timely remediation of security vulnerabilities.  Simply installing traditional security products and meeting compliance checklists are not enough.

Security SaaS ~ A Hybrid Approach

Posted by Security Steve on Oct 20, 2014


We’re all familiar with today’s ever changing security challenges. It seems every week there is another major news story about a security breach at or related to one of our very well known household brand names. So the questions arises, if theses well funded, well resourced, fortune 1000 companies can’t properly protect themselves from the dynamically threatening technology landscape, how is the typical SME/SMB supposed to be able to solve these same problems ?

Consumer Trust in Small Business Security

Posted by Vijay Basani on Jul 16, 2014


Late November 2013 began last year’s holiday shopping season, and with that, one of the biggest consumer data breaches in America’s corporate history. Across America, approximately 40 million consumers had their information compromised, and this information included “customer names, card numbers, expiration dates and the short verification codes known as CVVs — everything an attacker would need to create a counterfeit card,” NBC reported. As a consequence of the breach and its costly aftermath, Target CEO Gregg Steinhafel resigned in May 2014. The New York Post reported that Target’s profits dropped by $440 million after the breach.

It's All About Security AND Compliance

Posted by Security Steve on Jul 9, 2014


Why is it that there seems to alwys be a line irreversibly drawn between data security and regulatory compliance? On the one hand, you want to do everything to avoid auditors (and fines that can come if you ignore the mandates that govern your industry). Separately, however, you also need to avoid the hackers and attackers that could ruin your company’s credibility as well as cost hundreds of thousands of dollars in cleanup and PR. Historically it’s been difficult (if not impossible) to satisfy both sides of the information security equation, so as an IT professional, which would you choose?

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!

Calculate!

Posts by Topic

See All