Communication to CIO/CISO in the Health and Finance Industries

18 Aug 2017
Posted in: 

In the wake of the WannaCry and the more sinister Adylkuzz cyber-attacks, those employed as Chief Information Officers and Chief Information Security Officers within their organizations will be at the front line of defending their organizations against cyber threats. Due to the highly regulated nature of both the Finance and Health industries, compliance requiring security monitoring is of the utmost importance in preventing and mitigating cyber threats. However, the cost of creating in-house continuous cyber monitoring is inhibiting for most organizations. What is required is a partner. A partner who can provide 24/7 monitoring with extensive correlation rules combined with the right technology and experienced staff. All of which if done in-house can run into the hundreds of thousands of dollars.

Your Fully Managed SIEM Solution

13 May 2017
Posted in: 
Tags: 

Vijilan offers a 24/7 fully managed SIEM solution. Let our award winning product be your constant companion when sailing the cyber threat sea. Fundamentally, when looking to incorporate a Security Information and Event Management (SIEM) solution two options are available to organisations looking to implement a SIEM solution to strengthen their security posture. SIEM is also becoming an increasingly important in adhering to compliance standards.

Logs: The Forgotten Security Solution

6 Jan 2017
Posted in: 
Tags: 

The ever changing threat scape faced by organisations on a daily basis can keep staff, owners, and investors up at night. The ever present threat of a malicious cyber-attack can destroy an organisation no matter how big it is. How to combat and protect invaluable data in this cyber mine field? The answer lies in security log collection and analysis. What are logs? Logs, or security logs, are essentially record events either on a single device or a network as a whole. Logs record data such as logon events, object access, policy changes, privilege use, and system events just to name a few things recorded. Why are logs essential to cyber security?

Contact Us