New Video: Does MixMode work in the cloud, on premise, or in hybrid environments?

As enterprises establish their custom hybrid environments, many security departments are realizing that while they have many sophisticated tools on the on-premise corporate traffic side, they don’t have the same level of visibility of their cloud… Continue reading New Video: Does MixMode work in the cloud, on premise, or in hybrid environments?

New Video: Why is network data the best source for actionable data in cybersecurity?

In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source for actionable data in cybersecurity. He covered the limitations of each of the elements of a typical security stack (SIEM, Endp… Continue reading New Video: Why is network data the best source for actionable data in cybersecurity?

MixMode Now Supports Amazon VPC Flow logs

We’re excited to announce the general availability of support for Amazon Web Services’ VPC Flow Logs, in the MixMode platform! MixMode prides itself in offering a heterogeneous, “single pane of glass” view and analysis into multiple k… Continue reading MixMode Now Supports Amazon VPC Flow logs

How to Use Your Baseline for Network Security

This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here:
1) An Introduction to Baselining Technology
2) How to Create a Baseline for Your Network
The post How to Use Your Baseline for Netwo… Continue reading How to Use Your Baseline for Network Security

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker wa… Continue reading Case Study: MixMode AI Detects Attack not Found on Threat Intel

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining technology.
The post An Introduction to Baselining Technology … Continue reading An Introduction to Baselining Technology