Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

Configuring an Output with LimaCharlie

In this video we demonstrate how to configure an Output in LimaCharlie to send your telemetry anywhere. LimaCharlie users can relay their data anywhere they want for longer term storage and analysis. Where that data is sent depends on which Outputs are activated. You can have as many Output modules active as you want. For example you can send varying levels of data to multiple syslog destinations using the Syslog Output module and then send additional data to some cold storage over an Scp Output module.

Installing the LimaCharlie Sensor

In this short video we show you how easy it is to install the LimaCharlie EDR sensor and get telemetry flowing into the cloud. Once installed you can go live on the sensor and perform digital forensics in real-time. Visually navigate through historic telemetry, view memory maps, kill or suspend processes, explore the file system, view network connections and much more. Watch this video to see how powerful it is.

Taking A Unified Approach to Delivering Wi-Fi Connectivity and Security

Nowadays, teleworking or following a hybrid work model has become commonplace. The question we need to ask ourselves is, is our remote connection secure? The National Security Agency (NSA) in the United States has published a best practices info sheet for government workers and contractors working in areas related to national security and defense. info sheet supplies advice on how to avoid cyberattacks due to a compromised or unsecured wireless connection.

The Game Changer to Qualify for Cyber Insurance

Protecting sensitive data with multi-factor authentication (MFA) has become a requirement for cyber insurance policies. Recent attacks (SolarWinds, Colonial Pipeline, Kaseya) and mandates like the White House’s Executive Order to implement MFA in 180 days or less, are proving that identity and password-related vulnerabilities are a top security threat, and one where you can lose a lot of money.

Handling an incident in LimaCharlie: best practices, capabilities, tips & tricks

LimaCharlie benefits security organizations by providing the core technologies required for cybersecurity operations such as EDR, log ingestion, software defined networking and more. It does this with a self-serve, usage-based model. Run your operations through the web application or leverage the API and infrastructure-first approach to integrate at scale. Join us for this webinar to learn the best practices, tips and tricks for handling an incident.

7 features key to a unified and proactive endpoint security solution

This year’s Cybersecurity Awareness Month has come to an end and, with every passing year, cyberthreats are increasing in number and complexity. Reactive solutions are no longer enough to confront cyberattacks. Organizations must implement proactive strategies to secure their IT assets.

WatchGuard Cloud Named Best MSP/MSSP Platform in CRN's 2021 Tech Innovator Awards

WatchGuard been honored in CRN’s 2021 Tech Innovator Awards, with WatchGuard Cloud named the best MSP/MSSP Platform. Furthermore, CRN recognized the Firebox M4800 and M5800 as finalists in the Network Security – SMB category. This annual award program showcases innovative vendors in the IT channel across 47 different technology categories, in key areas ranging from cloud to storage to networking to security.

What is Endpoint Detection and Response (EDR)?

It can take just minutes, if not seconds, for an advanced threat to compromise a company's endpoint devices (laptops, mobile devices, and the like). Legacy security tools that were once adored and worshipped by many no longer cut it. These tools require manual triage and responses that are not only too slow for fast-moving and increasingly sophisticated cyber threats, but they also generate a huge volume of indicators that burden the already overstretched cyber security teams.

Why Windows 11 is more secure than Windows 10

Windows 11 is the most secure Windows version to date. Microsoft's new operating system is now available, after learning several lessons from its predecessor. The Redmond company states that the widespread use of hybrid and remote work environments during the pandemic opened the door to a host of threats, with Windows vulnerabilities exploited by hackers, such as the incidents with Specter and Meltdown.