article thumbnail

The Evolution of SIEM: Where It’s Been and Where It is Going

CyberSecurity Insiders

Back then, it was about ingesting data and kicking off alerts from all the cybersecurity products that were being used –– mostly host- and network-based intrusion detection devices (ISS et al), network tools, and firewalls (Check Point, Cisco, et al). Endpoint and anti-virus software would come a little later.

Marketing 116
article thumbnail

Cyber Defense Magazine: Exclusive Interview with Robert Herjavec

Herjavec Group

History shows he’s the first person to wrap the remote management business model around firewalls, from a small office on the east coast of Canada., In 2003, he knew that firewalls were too complex for all IT staff and for understaffed companies to manage. He and his tiny team of 3 people, began the world’s first MSSP.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

Network filters applied by solutions like Web Application Firewalls (WAFs) aim to solve symptoms, not the root cause. This doesn’t allow the IT administrator, the end-user, or the CISO to independently verify the security, safety, and resiliency of the software they buy and use. This is an easy band-aid.

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

Network filters applied by solutions like Web Application Firewalls (WAFs) aim to solve symptoms, not the root cause. This doesn’t allow the IT administrator, the end-user, or the CISO to independently verify the security, safety, and resiliency of the software they buy and use. This is an easy band-aid.

article thumbnail

A REFLECTION ON FORALLSECURE'S JOURNEY IN BOOTSTRAPPING BEHAVIOR TESTING TECHNOLOGY

ForAllSecure

Network filters applied by solutions like Web Application Firewalls (WAFs) aim to solve symptoms, not the root cause. This doesn’t allow the IT administrator, the end-user, or the CISO to independently verify the security, safety, and resiliency of the software they buy and use. This is an easy band-aid.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Read more : Best Next-Generation Firewall (NGFW) Vendors. Since 2003, Tiger Global Management has made over 900 investments with 120 exits. YL offers hands-on support for startup leaders in addition to an extensive network of cybersecurity industry leaders and CISOs. Mimecast Email security 2012 Nasdaq: MIME. Kleiner Perkins.