Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

Introducing LimaCharlie Comms: Operations at Scale

Comms is built for Digital Forensics & Incident Response. It is a console, communications platform and audit trail that is deeply integrated with all aspects of LimaCharlie. It is not something that was bolted on after the fact but rather something that has been purposefully built to operationalize the full power of LimaCharlie towards responding to threats and defending against attackers.

Cybersecurity Insights - Cyber Insurance Now Requires MFA

Recent cybersecurity incidents and ransomware attacks are driving companies to apply for cyber insurance. When doing so, companies have been facing one new prerequisite to become eligible: multi-factor authentication protection of your assets. Companies looking into acquiring cyber insurance need to make sure they won’t be paying high premiums, or even have their applications denied. In this session, you will learn from Alexander Cagnoni, director of Authentication at WatchGuard.

Using the Responder Sweep Tool

The responder - or sweep sensor functionality - is designed for incident responders or any one else trying to get the ground truth on a box. With one click of a button you can get list of processes and modules, a list of any unsigned binary code, autoruns, services, drivers, network connections, which sockets are listening on which ports and what is active on the network. It will also look for hidden modules or any indicators that are new to your organization.

Manually Installing LimaCharlie Net

This video walks through the manual installation of LimaCharlie Net. LimaCharlie Net (lc-net) allows you to secure and monitor network access to your endpoints by providing advanced instrumented VPN access. lc-net endpoints appear like other endpoints in your LimaCharlie deployment, but they're quite different in nature. These lc-net endpoints need to be provisioned to be accessed. By provisioning an lc-net endpoint, you create a set of VPN credentials that can be used by a single device. One set of credentials should be used by only a single device, and not shared among devices.

A Security Umbrella From A Single Vendor

Equipping your team with the most holistic cybersecurity stack is just as important as protecting your clients with the latest and greatest security solutions. There are many factors to consider before deciding which option would best benefit your business. Hear from Success Computer Consulting to learn what they consider as they're deciding which vendors to partner with.

Celebrating 25 Years

WatchGuard is celebrating our 25th anniversary in 2021! From our early days in Seattle’s Pioneer Square to a team of more than 1,200 today, our outstanding employees and culture have fueled our success. WatchGuardians past and present have contributed their curiosity, humor, dedication, teamwork, and customer focus to building a cybersecurity platform that simplifies every aspect of security delivery. It’s been a fantastic journey! We’ve gathered photos from decades past and interviewed a wonderful group of our colleagues to create this look back on 25 years of our history. Thank you to employees, partners, and customers, both past and present. We wouldn’t have made it here without you!