Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Devo's Latest Release Empowers Analysts to Discover Threats Faster and More Accurately

Over the past 12 months, the cyberthreat landscape has become much more tumultuous. A data breach analysis from the Identity Theft Resource Center (ITRC) found that the number of data breaches publicly reported so far this year has surpassed the total for 2020. That’s alarming. To combat this constant barrage of cyberattacks, you must equip your security team with the tools they need to match the pace of today’s data growth and cybercriminals’ relentlessness.

New CCO's Mission: Create a World-Class Experience for Devo Customers

Johannes Loeffler recently joined Devo as chief customer officer. He and his worldwide team are responsible for accelerating Devo’s efforts to provide customers with a seamless and superior customer experience. I joined Devo because I saw an amazing company with huge potential that is disrupting the logging and SIEM market. Devo’s solutions and services provide incredible value to our customers. And our customers are loyal to us, which is something money can’t buy.

Three Cloud SIEM innovations that improve team collaboration, tailor SOC workflows, and encourage customization

Sumo Logic is constantly improving our Cloud SIEM solution to meet the needs and demands of our current and future customers and help them modernize their security operations. Via our cloud-native platform, our engineers perform continuous delivery of product features and improvements to all Cloud SIEM customers—simultaneously—several times each week.

$250M in New Funding Positions Devo for Continued Growth and Success

On October 26, 2021, Devo announced a new round of $250 million in venture funding that gives the company a valuation of $1.5 billion. In a new Devo Inside Out video, CEO Marc van Zadelhoff and CFO Jennifer Grunebaum discuss the details of the investment and what it means for Devo’s ability to bring the industry’s most comprehensive logging and security analytics solution to more customers worldwide. Video Player 00:00 00:00 00:00 Use Up/Down Arrow keys to increase or decrease volume.

Integrate Egnyte and Sumo Logic for Greater Data Insights

Third-party integrations are vital tools for expanding the capabilities of the Egnyte platform. Today, we’re excited to share a little more about how our partnership with Sumo Logic helps businesses get better, faster security insights from their data. Sumo Logic is an enterprise-grade, cloud-based service that collects, manages, and analyzes log data from all systems in the enterprise.

SIEM use cases: the importance of bespoke threat detection rules

However, SIEM requires the effective application of use cases or threat detection rules to achieve its full potential. In the first of this two-part series, we outline the importance of SIEM use cases (or rules) and the limitations of relying upon those provided out of the box with SIEM platforms.

13 reasons Log360 is the SIEM solution for you: Part 2

Our integrated compliance management tool helps you breeze through audits. Log360 provides out-of-the-box templates to meet all the major compliance regulations, such as the GDPR, PCI DSS, FISMA, HIPAA, and GLBA. What’s more, you can monitor the compliance status for these regulations in real time on graphical dashboards. Log360 also provides prebuilt compliance alerts to notify you about any critical compliance-related events.

How to Detect SAP Threats in Real-Time with LogSentinel SIEM?

When it comes to the security of SAP systems, SIEM products often fail to meet companies’ expectations as they couldn’t fully interpret the SAP logs. LogSentinel Next-Gen SIEM solves this problem, eliminating the blind spots, as well as all SAP threats, and successfully parsing every log file in a human-readable format.

Analyzing Human Layer Risks with Tessian

Year over year, organizations onboard new technologies to improve their cybersecurity posture, yet data breaches are still on the rise. The root cause of data breaches is people. In fact, 85% of data breaches today are caused by human error. Employees have access and control to the business’ most sensitive systems and data.