Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Case Study

Indigov's security team uses Datadog Cloud SIEM & Log Management to reduce mean time to respond

Watch this video to learn about how Indigov’s Security team (that runs their SOC, compliance program, and operations to support developers throughout the software development lifecycle) has deemed Cloud SIEM as one of the easiest and most integrated platforms to drive down response time from hours to minutes. Datadog Log Management has helped Indigov centralize all disparate data into one spot and Datadog Cloud SIEM’s out of the box detection rules and workflows have helped to capture their incident response process–driving response time down from hours to minutes!

Unlocking Seamless API Security: Revenera's Journey with Wallarm

In today’s digital landscape, ensuring the security of web applications and APIs is paramount. The journey to find the right security solution can be filled with challenges and choices. In this blog post, we’ll dive into the experience of Rob Davies, VP of Engineering and Lead Architect at Revenera, as he navigates the path from identifying the need for enhanced API security to making a decision, implementing the solution, and reaping the benefits.

CrowdStrike's Advanced Memory Scanning Stops Threat Actor Using BRc4 at Telecommunications Customer

As CrowdStrike’s Advanced Memory Scanning capability has matured, so have its applications. CrowdStrike detection engineers and researchers work tirelessly to ensure the CrowdStrike Falcon® platform’s detection content stays ahead of adversaries. The following case study describes how CrowdStrike leverages memory scanning in combination with new IOAs to provide world-class protection to our customers.