Blog

Blog

Blog

Using SOAR to Maximize SOC Analyst Efficiency While Minimizing Fatigue and Burnout

“Today, cyber security operations do not suffer from a ‘Big Data’ problem but rather a ‘Data Analysis’ problem.” – SANS Institute Security Operation Center (SOC) analysts are getting stretched thin and hitting efficiency roadblocks, especially as they gather and analyze alarm data from multiple platforms.
Posted in Blogs, Home Page | Comments Off on Using SOAR to Maximize SOC Analyst Efficiency While Minimizing Fatigue and Burnout

StratoZen’s Co-Founder Discusses the Benefits of SIEM-as-a-Service

Security information event management (SIEM) software is a suite of solutions that facilitate the collection, oversight, and analysis of log data from multiple computer systems across distributed IT systems. SIEM software’s main purpose is to identify threats and report suspicious activity.
Posted in Blogs, Home Page, SIEM and SOC | Comments Off on StratoZen’s Co-Founder Discusses the Benefits of SIEM-as-a-Service

CIS Controls: What are They and Why are They Important?

The Center for Internet Security (CIS) critical security controls (initially developed by the SANS Institute and known as SANS Critical Controls) are a list of recommended high-priority and highly effective defensive actions. These actions are the starting point for any business, enterprise, and company looking to improve their cybersecurity, and are viewed as “must-do, do-first” actions.
Posted in Blogs, Home Page | Tagged | Comments Off on CIS Controls: What are They and Why are They Important?

Watch our Recorded Interview with a MSP Discussing the Impact of COVID-19 on Service Providers and Customers

  As part of StratoZen’s effort to support the MSP community during these challenging times, we hosted a live interview with one of our MSP partners. In this interview, moderated by Eric Gravett, CRO of StratoZen, Don Baham, President of Kraft Technology Group and Chris Gebhardt, VP of Operations of StratoZen, discussed the impacts of the COVID-19 pandemic on both businesses and customers.
Posted in Blogs, Home Page | Tagged | Comments Off on Watch our Recorded Interview with a MSP Discussing the Impact of COVID-19 on Service Providers and Customers

Coronavirus Cyber Threats Resource Page

To aid organizations in communicating common and emerging threats to users, we are providing a list of example threats that we’re watching specific to the COVID-19 outbreak.
Posted in Blogs, Home Page | Comments Off on Coronavirus Cyber Threats Resource Page

Top Six Cybersecurity Recommendations While Transitioning to a Remote Workforce

As many companies around the country begin work-from-home policies, we’re seeing an increase in the number of cybersecurity attacks aimed at end users and end user systems. We know that many IT operations teams – both in-house enterprise teams and Service Providers – are scrambling to implement the technical capabilities and processes to enable a remote workforce.
Posted in Blogs, Home Page | Comments Off on Top Six Cybersecurity Recommendations While Transitioning to a Remote Workforce
cybersecurity companies

The Process of Implementing SOAR: Deployment and Technology

My last post, entitled “What is SOAR and why is it important”, illustrated why SOAR is needed in the industry alongside faster maturation. If you didn’t catch that one, I’d suggest reading it first for context.  With that post as the backdrop, I will now focus on how we can solve the two main issues with traditional SIEM and SOC: response time and expertise, both of which SOAR promises to solve. 
Posted in Blogs, Home Page, SIEM and SOC | Comments Off on The Process of Implementing SOAR: Deployment and Technology

What is SOAR and Why is it Important?

Security Orchestration, Automation and Response (SOAR) has been getting a lot of attention recently. I thought it would be good to take a moment and discuss what it is and why it is important to the industry.  Gartner was the first to formally define SOAR: “SOAR refers to technologies that enable organizations to collect inputs monitored by the security operations team.
Posted in Blogs, Home Page, News, Resource Featured Post | Tagged | Comments Off on What is SOAR and Why is it Important?
MFA

Is MFA Enough? No, It is Not

Anyone in the cybersecurity field will tell you that enabling Multi-Factor Authentication is the single most important service to prevent nefarious account take-overs. While this information is true, it is also artificially imputed that with MFA enabled, password security is reduced. 
Posted in Blogs, Home Page, Resource Featured Post | Tagged , | Comments Off on Is MFA Enough? No, It is Not
SIEM

Benefits of a SIEM with Advanced Configuration

It is 3:00 am and you get a call from your service provider that monitors your network for cybersecurity attacks. These are the calls you dread.  The analyst tells you they are seeing a real-time MS-SQL injection attack. The attack is coming from a source in China to one of your servers. 
Posted in Blogs | Tagged , , | Comments Off on Benefits of a SIEM with Advanced Configuration