Boston, MA, USA
May 20, 2020   |  By Sebastien Tricaud
As if the pandemic itself weren’t causing enough pain and suffering in the world, cybercriminals are busy developing and deploying COVID-19-related malware to try and take advantage of unsuspecting victims. Fortunately, one of the world’s leading technology companies, Microsoft, is taking action to help people avoid becoming victims of these scams.
Apr 29, 2020   |  By Jason Mical
During the past decade, security operations centers (SOC) have become an integral part of the cybersecurity programs of many organizations. When you think of a defined team spending all of its time managing security events and using consistent processes for remediation, you may envision a group of company employees who report to a CIO or CISO.
Apr 14, 2020   |  By Jill Orhun
With most of the country sheltering in place and so many people working remotely, work-life balance is taking on a new meaning and cloud infrastructure is taking a beating. The dramatic increase in daily activity and network use is creating both a visibility challenge and an operating model shift for already lean security teams.
Mar 24, 2020   |  By Devo
Building an in-house SOC represents a significant commitment, both financially and strategically, to securing your enterprise. In a report from the Ponemon Institute—based on a survey sponsored by Devo of more than 500 IT and security practitioners—67 percent of respondents said their SOC was “very important” or “essential” to their organization’s overall cybersecurity strategy.
Mar 11, 2020   |  By Jason Mical
You’ve probably heard by now that we face a severe shortage of cybersecurity professionals with the skills and experience necessary to effectively defend against today’s—and tomorrow’s—threats. Cybersecurity Ventures estimates there will be 3.5 million unfilled jobs globally by 2021. Fortunately, there are key areas of the SOC workflow that can be automated to take advantage of security analyst intuition and act as a force multiplier.
Jan 31, 2019   |  By Devo
Data growth is running at close to seven exabytes per day; estimates are that in three to five years’ time, growth will be closer to 15 to 25 exabytes per day. Yet many organizations fail to realize the business value of their data, lack the tools and processes to collect and analyze data more effectively, and do not understand how to calculate its return on investment (ROI) potential.
Jan 1, 2019   |  By Devo
The Devo architecture is designed to collect, analyze, and provide insight from more data faster, and to scale as data grows using a fraction of the resources required by other solutions. The Devo Data Operations Platform avoids the bottleneck of indexing data at ingestion without the penalty of slower query response.
Dec 1, 2018   |  By Devo
The Devo Data Operations Platform provides a machine data management and analytics platform that enables companies to extend operational insights beyond IT and into the digital business.
Nov 1, 2018   |  By Devo
This paper examines a problem many enterprises share: operationalizing increasing amounts of historical as well as real-time data, with a sustainable business model.
Oct 1, 2018   |  By Devo
Enterprises are dealing with a rapidly changing and growing IT environment that includes traditional systems and desktops as well as cloud resources and an ever-changing constellation of edge computing devices. Enterprises facing the difficult choice among “build your own,” “buy solutions from their suppliers,” or integrating open source projects would be well served by learning more about Devo.
Apr 6, 2020   |  By Devo
How to use existing data to create query tables and their modalities
Mar 23, 2020   |  By Devo
Devo offers Autoparser as a tool to discover the internal structure of proprietary non-standard tables.
Mar 23, 2020   |  By Devo
A quick method to cross internal data with any external web service.
Feb 13, 2020   |  By Devo
Devo Security Operations reinvents the SIEM and empowers analysts to focus on the threats that matter most to the business.
Feb 13, 2020   |  By Devo
Threat hunting is an essential component of any defense strategy and with Devo Security Operations, threat hunting is easily accomplished. The threat hunting module in Security Operations enables analysts to quickly find evidence of adversaries within their network.