Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


New Locky Ransomware Takes Another Turn

A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

New Locky Ransomware Takes Another Turn

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Security-as-a-service supplier Alert Logic started with IDS and blossomed from there  (Read 27 times)

0 Members and 1 Guest are viewing this topic.

ChubbTopic starter

  • Freebies and Good Deals Mod
  • Administrator
  • *
  • Offline Offline
  • Posts: 66545
  • .: Freebie King
Security-as-a-service supplier Alert Logic started with IDS and blossomed from there
15 May 2017, 9:21 pm

Gray Hall, CEO of Alert Logic, cut his teeth delivering enterprise-class services when he started VeriCenter, one of the earliest managed hosting companies.  Hall eventually sold that company to SunGard Data Systems in 2007, and in 2009 joined Alert Logic where he has since driven revenue growth 12x.  Network World Editor in Chief John Dix recently caught up with Hall to learn more about Alert Logic and the security-as-a-service movement.

Lets start with a brief background on the company.

Alert Logic was founded in 2002 -- the founders are still with us today in very key roles – and the original vision was to bring together SaaS and managed security services, starting with Intrusion Detection Systems (IDS). Sourcefire had been around for a long time, they were the gorilla in the space (now owned by Cisco), but Sourcefire is a very advanced product and most of our customers would say it’s expensive, complex, and you need a lot of expertise to make it work.  It’s only as good as the content you feed it and once you reconfigure your network, you have to do it all over again … tuning, configuration, etc.

To read this article in full or to leave a comment, please click here

Source: Network World Security

>> To obtain the full NetworkWorld Security article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks