Gartner Blog Network

Tag: 'threat-detection' Blog Posts

from the Gartner Blog Network

Endpoint Has Won, Why Bother With NTA?

by Augusto Barros  |  October 3, 2018

One of my favorite blog posts from Anton is the one about the "SOC nuclear triad". As he describes, SOCs should use logs, endpoint and network data on their threat...

Read more »

The "working with an MSSP" Tome Is Here

by Augusto Barros  |  January 30, 2018

As Anton just posted, the new version of the famous "How to Work With an MSSP to Improve Security" has just been published. I'm very happy to become a co-author...

Read more »

Security Monitoring Use Cases, the UPDATE!

by Augusto Barros  |  January 17, 2018

Posting about updated documents is often boring, but this time I'm talking about my favorite Gartner document, as usual, co-authored with Anton: "How to Develop and Maintain Security Monitoring Use Cases"!...

Read more »

Threat Detection Is A Multi-Stage Process

by Augusto Barros  |  December 4, 2017

We are currently working on our SOAR research, as Anton has extensively blogged about. SOAR tools have been used to help organizations  triage and respond to the deluge of alerts...

Read more »

Webinar on Security Monitoring Use Cases

by Augusto Barros  |  January 19, 2016

As I mentioned (many times) before, our current research covers Security Monitoring Use Cases. We've been busy writing about that and the paper will be available soon to Gartner clients....

Read more »