MI-One Issue #6 - Augustus Edition
We bring you highlights from Black Hat USA, our latest observations in the industry, a couple of tool updates, and integration insights from our factory.
We bring you highlights from Black Hat USA, our latest observations in the industry, a couple of tool updates, and integration insights from our factory.
Dive into issue #5 of MI-One, your exclusive look into security automations and integrations.
Take a closer look at the features and availability of the Logpoint SIEM.
Welcome to the 3rd edition of MI-One, your exclusive monthly peek into the inner world of security system integrations and automation from Metron.
Metron is pleased to announce it is helping to secure enterprise networks with HPE.
We’re back with the sophomore edition of MI-One, your exclusive monthly peek into the inner world of security system integrations and automation.
Discover whether Sumo Logic's SIEM offering could become a valuable tool for your organization.
Discover whether Splunk's SIEM offering is right for your organization.
Take a closer look at the latest security system integrations and automation updates from Metron and beyond.
In the following post we walk you through how to fetch logs in this platform.
Looking for a cloud-native SIEM but unsure where to begin? Become familiar with Exabeam’s Fusion offering here.
In the following post, we discuss tips and considerations for connecting your SIEM with AWS for efficient cloud security and optimization.
Looking for a SIEM but uncertain where to begin? Become familiar with FortiSIEM and if it's the right choice for your organization.
SOAR platforms can act as the central hub for your security needs. We outline 6 important factors to consider for SOAR adoption as we move into 2024.
Companies are increasingly automating essential security operations center (SOC) tasks. In the following guide, we outline 5 SOAR use cases for your SOC.
In this short post, we dive into five key use cases that highlight the indispensable role a well-integrated SIEM plays in enhancing an organization's threat hunting capabilities.