Vendor Profile
-
Secure Your Business Network with NordLayer’s Cloud Firewall
Cloud Firewalls play a crucial role in safeguarding sensitive information, maintaining compliance with regulations, and ensuring the availability and performance…
Read More » -
Rise of the Machines: The 2024 SOC Transformation
Leonid Belkind, CTO and Co-Founder of Torq, shares insights on how AI-driven hyperautomation addresses the existential challenges SOC analysts face.
Read More » -
Microsoft Intune Suite – Beyond Endpoint Management in 2024
Simplify endpoint management and security with a single, connected experience with the Microsoft Intune Suite.
Read More » -
Integrating Jira into your Security Operations Center with XM Cyber
Applications like Jira have become indispensable tools within SOCs, aiding in efficient incident management and response.
Read More » -
Device Posture Security | NordLayer
NordLayer’s Device Posture Security diligently checks and validates each device, safeguarding your organizational network from unauthorized and non-compliant devices.
Read More » -
Introduction to AWS Network Firewall
AWS Network Firewall provides organizations using AWS with a centralized method to implement security measures and policies across VPCs and…
Read More » -
Managed SIEM: How to protect your business with detection & response
In this latest webinar Oliver Pinson-Roxburgh shares his thoughts on the importance of having a managed SIEM service.
Read More » -
Evolving your security capabilities through key growth stages
You may know what key security capabilities your startup needs, but this session will help you establish which stage of…
Read More » -
Zero-privilege operations: Running services without access to data
In this session, learn how AWS secures data, even from trusted AWS operators and services.
Read More » -
Harness power of IAM policies & rein in permissions w/Access Analyzer
Explore the power of IAM policies and discover how to use IAM Access Analyzer to set, verify, and refine permissions.
Read More »