Keeping Up the Pace of Cloud Transformation
You’ve successfully migrated to the cloud: Now what? Cloud transformation is where you can set yourself apart from the rest.
Protecting Your SQL-based Cloud Environment: Log Analysis
This post examines cloud security and protecting web applications with a focus on the role of consistent and intelligent log analysis.
Protect Your SQL-based Cloud Environment: Vulnerability Scanning & Pen Testing
Protect your SQL-based cloud environment with vulnerability scanning & penetration testing. Learn best practices to safeguard your data from threats.
Securing Your Business in Changing Times and Ways of Working
The arms race between cybersecurity and cyber attacks is nothing new. Organizations have always tried to stay one step ahead of malicious agents looking to access and sabotage their company network. However, the threat landscape changed in the wake of the COVID-19...
The Importance of Security, Right Now: An MSP Perspective
It’s been a week since I attended the LinkedIn Live stream, “The Importance of Security, Right Now”, where I shared my views on cybersecurity from the viewpoint of a Managed Service Provider (MSP). As CTO at Timico, I speak to our customers on a daily basis about...
Jumping the Migration Hurdle
In the race to digital, you can unlock endless benefits with cloud transformation. But to do it effectively you need to ensure you understand every step of the cloud journey. You need to set yourself up to not only go through the...
Effective Security Communication
Cyber attacks have been increasing for almost three decades. Meanwhile, security is an essential part of the critical path for major initiatives like cloud migration and the success of a growing remote workforce. While press and analysts have increased awareness on...
Alert Logic File Integrity Monitoring
A closer look at the value of Alert Logic File Integrity Monitoring (FIM) and how it helps organizations address PCI-DSS (Payment Card Industry Data Security Standard) requirements 10.5.5 and 11.5.
Protect Your Web Apps with Web Log Analytics
Alert Logic Web Log Analytics (WLA) provides the ability to detect anomalous behavior and suspicious activity to protect your web applications and your environment.
Simplify PCI Compliance with File Integrity Monitoring (FIM)
Alert Logic added File Integrity Monitoring (FIM) to help customers achieve and maintain compliance with PCI-DSS (Payment Card Industry Data Security Standard)–specifically requirements 10.5.5 and 11.5.
Extend the Alert Logic MDR Platform with Our DevNet Software Developer Portal
The Alert Logic DevNet software development portal enables customers and partners to extend the managed detection and response (MDR) platform and efficiently extract and work with useful information.
Make It Easier to Manage Workflow with Connectors
Alert Logic developed Connectors to enable customers and partners to automate workflow between the Alert Logic MDR platform and third-party messaging and ticketing systems.