Knowledge Center

View the latest webcasts, videos, articles, white papers, and more.

Gain valuable insight into network management and cybersecurity trends through our team of security experts, senior business leaders, and network engineers.

Articles

View All →

Best Practices to Halt Insider Threats

Best Practices to Halt Insider Threats

While nation-state threat actors and external hackers often garner the headlines, insider threats are an often-overlooked threat vector. Rockwell-Boeing, Anthem Healthcare,...

Coordinated Ransomware Attacks Hit Resource-Constrained Municipalities

Coordinated Ransomware Attacks Hit Resource-Constrained Municipalities

A financially motivated ransomware gang hit 23 local governments in Texas in a coordinated attack last week. Ransomware is a type of malicious software, often delivered via...

Mitigate Software Supply Chain Attacks with SIEM and EDR

Mitigate Software Supply Chain Attacks with SIEM and EDR

At Black Hat 2019, Eric Doerr, GM of the Microsoft Security Response Center, reminded attendees of the interconnectedness of enterprise software supply chains and of their...

Catch of the Day

View All →

Outdated Protocol Exposes University to Cyber Attack

The Network: A decentralized university with 34,000 students, dozens of departments, over 9,000 employees and...

EDR catches Emotet at MSP’s Healthcare Customer

The Network: A Managed Service Provider (MSP) installed EventTracker Essentials with EDR to mitigate threats on 900...

MSP Cures a Global Healthcare Non-Profit

The Network: A managed service provider (MSP) implemented the EventTracker Co-managed SIEM service for a healthcare...

Whitepapers

View All →

A Dollar of Prevention is Worth a Bitcoin of Cure

A Dollar of Prevention is Worth a Bitcoin of Cure

A true story of how one organization was impacted by a data breach. This executive brief shares the true story of an...

Zero to SOC

Zero to SOC

Every business–no matter its size–is a bullseye for cyber criminals. Data breaches cost an average of $3.6 million...

Choosing the Right SIEM

Choosing the Right SIEM

While there is little doubt that SIEM solutions are critical for compliance, security monitoring or IT optimization...

Case Studies

View All →

Altamaha Bank and Trust

Altamaha Bank and Trust

A community bank with 150 million in assets services customers with four branches and an operations center. Their...

How South River Electric Membership Corp. Succeeds at Security and PCI DSS

How South River Electric Membership Corp. Succeeds at Security and PCI DSS

South River Electric Membership Corporation, (South River EMC ) is a member-owned electric distribution cooperative...

EventTracker Simplifies SIEM for Labor Union

EventTracker Simplifies SIEM for Labor Union

A large labor organization with 350 staff serving more than 300,000 members across North America was seeking a log...

Tools and Assessments

View All →

SIEM TCO Calculator

SIEM TCO Calculator

Maximize the value from SIEM. Use this SIEM calculator to compare the cost of Co-Managed SIEM and Traditional SIEM.

Are You on the MSP Path to Profit?

Are You on the MSP Path to Profit?

Cybersecurity incidents are impacting SMBs more and more, and making business-as-usual uncomfortable for MSPs.

Are You Prepared for Retail Ransomware?

Are You Prepared for Retail Ransomware?

Take the assessment to find out your risk level and revenue impact potential, since the rise of ransomware attacks on...

Infographics

View All →

What to expect from your SOC-as-a-Service

What to expect from your SOC-as-a-Service

Are you experiencing a shrinking IT budget and a shortage of cybersecurity experts? Building and retaining a 24/7 SOC...

Today's Cybersecurity Isn't as Secure as You Think

Today's Cybersecurity Isn't as Secure as You Think

Companies try to prevent attackers from getting into their systems with the shotgun approach. They deploy a patchwork...

MSP Margins are Becoming Slimmer and Customers Less Loyal

MSP Margins are Becoming Slimmer and Customers Less Loyal

As an MSP, your focus should be on developing trust, strategy, and a reliable partnership.

Technology is just the tip of the iceberg

Technology is just the tip of the iceberg

SIEM (Security Information and Event Management) is foundational along with other technologies. But an integrated...

The Cost of Doing Nothing

The Cost of Doing Nothing

The cost of doing nothing can be greater than the cost of protecting your business.

See EventTracker in action!

See EventTracker in action!

Join our next live demo October 1st at 2:00 p.m. EST.

Register Here