alephtavtechnologies_incident_response_indicators-of-compromise

Are You Capturing Indicators of Compromise the Right Way?

In a threat environment, rapid communication of real time threat information is the key to detect, respond to and contain targeted attacks in a short time. Aberrant activities such as port scans, planted malware or spear phishing on the network or miscellaneous hints on system can help enterprises to cite attacks. After the identification of […]

aleph-tav-technologies-siem-and-threat-management-for-sdn

SDN Security: Protecting virtualized networks from cyber attacks

The boom of hybrid cloud, BYOD and private virtual clouds are upon us, and as the use of bandwidth-intensive enterprise applications spiking, many large players are spearheading the adoption of Software Defined Networks (SDN) for flexibility, availability and performance. After all the initial skepticism was put to rest, it is quite clear that SDN is here to […]

Aleph Tav Technologies_Managed_Security

Find your fit: How to select a security monitoring solution?

Competitors Company X and Company Y, both have corporate networks to protect from cyber attacks. Company X opts for a certain security analytics feature for their public-facing website linked to database servers. Company Y follows suit even though they don’t have a similar system architecture. When asked why, Company Y responded saying, “We thought it […]

Aleph Tav Technologies IDS and SIEM

Protect your enterprise users from watering hole attacks

Never trust a threat level meter that puts a watering hole attack and a drive-by attack under the same risk rating. No matter how much it seems to play out like its indiscriminate cousin (the drive-by attack), watering hole attacks are absolutely targeted. What’s worse, these are the kinds of attacks that use intelligence gathering […]

Keeping your network devices secure

Despite constituting the lifeline of every corporate IT infrastructure, network devices happen to be the most notoriously insecure, making them favorite targets of both sophisticated hackers and script kiddies. In the thick of mounting pressure from political groups in favor of government surveillance through backdoors in encrypted devices to combat terrorism, the likes of Juniper’s […]

Aleph Tav Technologies Insider Threat Detection - Managed Security

Common Insider Threats and how to mitigate them

As the saying goes, men may come and men may go, but an organization might go on forever – that is unless a malicious insider comes along who would eventually risk its corporate content and intellectual property and walk out the door with years of data and research. Let’s face it. Your enterprise data is […]

Managed Security for MSPs

Bolster your Managed Service Business with Comprehensive Managed Security

The benefits of integrating Managed Endpoint Security with your Managed Service Business Be it remote monitoring and management for network support, data management or hosting, a managed service provider has a number of expectations to meet in guaranteeing not just a safe and secure environment but enabling pervasive visibility of it for customers. In their […]