Contact Sales

endpoint security blog

Final-Connect-Image.jpg

Do You Value Time or Knowledge on Cyber Security Protection? Change the Discussion

As we head into the final stretch before RSA, CounterTack, like most cyber security protection organizations, is realizing how critical every day, every hour and every minute is, relative to the work we are doing for our customers in protecting their IT infrastructure. 

And as each vendor, enterprise organization, partner and investor gets ready for five days of meetings, presentations, job interviews and cocktails, RSA is typically the platform for numerous announcements and cyber security tools advancements. 

Read More

Topics: cybersecurity, Next-gen endpoint security, cyber attcks, attack dwell time

Cyber Security Tools: Active Defense, Detect Malicious Code

We know that SOC/IR teams suffer from alert overload on a daily basis.  Too many cyber security tools resulting in too much data being passed to the teams.  In reviewing those alerts, these folks need to review tons of data to confirm or disprove the alert validity.  SOC and IR pros look for ways to limit the data that they have to review.

Active Defense Overview

Read More

Topics: Next-gen endpoint security, Hash Sets, Active Defense

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all