Alert Logic ActiveIntelligence is comprised of two teams who fuel the intelligence behind our technologies: the Threat Intelligence team and the Security Content team. The Threat Intelligence Team researches new and emerging cloud security threats and the Security Content team takes data delivered from the Threat Intelligence team, along with third party input, and creates the security content that is deployed.
We find the security threats and risks in your infrastructure, and we recommend the best course of action to take. Staffed by GIAC-certified analysts, the Alert Logic ActiveWatch managed network security model offers threat intelligence with 24x7 security monitoring, management, and expertise without the challenge of developing and maintaining an in-house security team.
Our Security Operations Center (SOC) experts investigate malformed website requests to identify and implement required policy changes, respond to incidents, and provide ongoing tuning services.
We automate the collection, aggregation, and normalization of log data across your entire environment.
With our intrusion detection system (IDS) and vulnerability scan capabilities, we monitor your network traffic for suspicious activity, analyze identified incidents, and escalate according to your requirements.
The Security Content team manages internal and external security content that provides critical insight and additional fidelity to incidents.
The Threat Intelligence team mines the cyber underground looking for information to feed the Security Content Team
We get you fully operational in days to weeks to manage your entire monitoring and security incident investigation process, for on-premises, cloud, or hybrid environments. You can avoid the costly investment of hiring and training an internal security team.
With our Software-as-a-Service (SaaS) solution, there isn’t any complex implementation or maintenance—just the latest security technology and GIAC-certified analysts working for you.
Improve your overall security posture and recover from breaches and compromises faster with dedicated help from security experts.
In this edition of the Weekly Threat Report, the Alert Logic team highlights the Crunchyroll Malicious Software Redirect and how QBot Adds Geographic Complexity to Malspam. Read the full report to learn more and get access to the week’s Top Malicious IP addresses.View This Week's Full Threat Report
Anime streaming service gets hijacked within Cloudflare configuration. Hackers redirect users to isolated homepage, prompting users to download malicious "new media player."
Researchers uncover new findings in recent malspam campaigns, with increased usage in the QtBot downloader. Attackers are now deploying Locky ransomware or the Trickbot banking Trojan depending on the victim’s geographical location.
Want to learn about Alert Logic products in more detail? Call us direct at +1.877.484.8383, for the UK call +44 (0) 203 011 5533, or complete this form. An Alert Logic representative will contact you soon.