Our insight

04-Jun-2018

The modern network can't survive without a security ecosystem. But with multiple complementary services, devices and systems producing millions of log events each month, identifying and acting on security events is a skilled and time-consuming job.

So you have three choices

Read More [fa icon="long-arrow-right"]
25-Apr-2018

Since we launched our Managed SIEM service, we've been talking a lot about the kind of security, reporting and compliance headaches that businesses face, and how Managed SIEM (security information and event management) can help solve them. That's an important angle - as I know very well from my 22 years 'client side' at a major retailer - but I want to explore the additional benefits of having a team of information security experts on call, armed with the latest threat intelligence and event management tools.

Read More [fa icon="long-arrow-right"]
18-Apr-2018

SIEM isn't a one-size fits all proposition. Organisations have unique IT estates, face unique threats and risks, and have unique requirements from their security solutions. Finding the right SIEM (security information and event management) solution means weighing up your needs and matching them to the vendor and service who can best satisfy them, and at the right price.

To help you choose wisely, we've put together these 10 tips for getting a SIEM service that meets your requirements.

Read More [fa icon="long-arrow-right"]
29-Mar-2018

You don't need me to tell you that there's a worldwide shortage of cyber skills - just try advertising a cyber security vacancy. According to the Center for Cyber Safety and Education there's already a 1.5 million-person shortfall in the worldwide information security workforce, and the centre's research suggests this will have widened to 1.8-million staff by 2022.

What does this mean for you?

Read More [fa icon="long-arrow-right"]
21-Mar-2018

Ideal has officially launched its latest managed security service: Managed SIEM (security information and event management). I want to explain what it is, and how it helps you become more secure without the associated costs and resource headaches.

Read More [fa icon="long-arrow-right"]