New Video: How is MixMode Different From Today’s Network Security Tools?

With MixMode in the center of a program, we will make all the other security investments that you’ve made, better. So when you send data to your SIEM, when you send data to your SOAR, you don’t want those products to be overwhelmed with fal… Continue reading New Video: How is MixMode Different From Today’s Network Security Tools?

4 Challenges of Stand-Alone SIEM Platforms

While SIEM is undoubtedly a step up from unmonitored network environments, the inherent nature of today’s SIEM software often falls short in several important ways. SIEM is an outdated solution for adequately protecting networks within the modern… Continue reading 4 Challenges of Stand-Alone SIEM Platforms

New Video: Why is network data the best source for actionable data in cybersecurity?

In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source for actionable data in cybersecurity. He covered the limitations of each of the elements of a typical security stack (SIEM, Endp… Continue reading New Video: Why is network data the best source for actionable data in cybersecurity?

Network Data: The Best Source for Actionable Data in Cybersecurity

With the right tool, your network data can now provide you with most valuable, actionable alerts in your security stack. What follows is a discussion of some of the reasons why you may want to look to your network first when trying to identify potentia… Continue reading Network Data: The Best Source for Actionable Data in Cybersecurity

Staying CCPA Compliant with MixMode’s Unsupervised AI

Companies are expected to spend up to $55 billion dollars on efforts to comply with the California Consumer Privacy Act (CCPA), which is still working out its final rules after going into effect this month.
The post Staying CCPA Compliant with MixMode’… Continue reading Staying CCPA Compliant with MixMode’s Unsupervised AI

How to Use Your Baseline for Network Security

This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here:
1) An Introduction to Baselining Technology
2) How to Create a Baseline for Your Network
The post How to Use Your Baseline for Netwo… Continue reading How to Use Your Baseline for Network Security

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining technology.
The post An Introduction to Baselining Technology … Continue reading An Introduction to Baselining Technology