Security issues are currently at the forefront of a comprehensive monitoring attention: the performance of business-critical IT applications must be guaranteed even against the background of increasing cyber attacks. This was the main topic of our first Live Meeting session, with Security Auditor Günter Aigle presenting how availability, integrity and confidentiality create more security in a more vulnerable IT-world through a well thought-out Data Protection & Network Monitoring. Afterwards Georg illuminated the current approach of more data security against the background of increasing cyber attacks with NetEye SIEM.
Thank you all for joining, see here the presentations!
Elastic 8.16, which comes with NetEye 4.39, made Elastic Universal Profiling generally available for self-hosted installations. This means that NetEye SIEM installations will now be able to take advantage of the continuous profiling solution by Elastic. In this blogpost we'll Read More
In the first part of this series, we explored how Jira Service Management (JSM) helps streamline Incident Management, aligning with ITIL v4 best practices. Incident Management aims to restore normal service operation as quickly as possible after a disruption, ensuring Read More
Hello everyone! Today, I'd like to briefly discuss an improvement to the update and upgrade procedures that we've started to adopt with NetEye 4.39! What we wanted to improve One aspect that made quite an impact was that whenever the Read More
Hello everyone! Today, I’d like to share an exciting improvement we’ve made to the installation and upgrade procedures in NetEye, introducing a faster and more efficient parallel architecture! Why Modernize the Installation and Upgrade Processes? At Würth Phoenix, we strive Read More
Note: This description of a security analyst's daily routine is fictitious. However, the osquery examples have been tested and can therefore be used as a template for your own research. 1. Alarm Detection Today started with a high-severity alarm from our Read More