The Importance of Cybersecurity Threat Detection for Utilities

November 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are created equal.

Spotlight

CounterTack

CounterTack is the leading provider of real-time, Big Data endpoint detection and response technology for the enterprise. CounterTack provides unprecedented visibility and context around endpoint behavior to targeted, persistent threats to improve incident response and threat detection, enterprise-wide. Built on Big Data architecture to counter endpoint threats at-scale and leveraging tamper-resistant collection for pure behavioral capture on enterprise endpoints, (laptops, servers, workstations, mobile devices) CounterTack dramatically reduces the impact of advanced attacks in real-time, giving teams an opportunity to defend the enterprise before incidents escalate. Based in Waltham, Mass., and with offices in Santa Monica, CA, Sacramento, CA and Washington, D.C., CounterTack is privately-held, and venture-backed by Fairhaven Capital, TenEleven Ventures, EDBI, Goldman Sachs and a group of private investors.

OTHER WHITEPAPERS
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

Ransomware: How to prevent, predict, detect & respond

whitePaper | January 9, 2020

The malicious programs known as ransomware have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organizations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations [2, 3]. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats. Ransomware is most commonly spread by two methods.

Read More
news image

Security White Paper for Synappx Applications and Services

whitePaper | September 28, 2022

Synappx application services help bring smarter office experiences. They are designed to help optimize hybrid collaboration experiences. Synappx application services are protected by a robust, layered security system to ensure the system and its components are not opening points of vulnerability for your data or networks. Through a combination of world-class technology providers including Microsoft Azure, Google Workspace and security best practices, your use of the Synappx application services helps keep your information safe and secure while helping you enhance productivity in your office.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

Dell VxRail: Comprehensive Security by Design

whitePaper | September 29, 2022

In today’s world, business organizations and individuals have become accustomed to accessing the information they need 24 hours a day, seven days a week, often within seconds of making a request. To illustrate, an ad marketing study conducted by Google found that 53% of website sessions are terminated if pages take longer than three seconds to load.

Read More

Spotlight

CounterTack

CounterTack is the leading provider of real-time, Big Data endpoint detection and response technology for the enterprise. CounterTack provides unprecedented visibility and context around endpoint behavior to targeted, persistent threats to improve incident response and threat detection, enterprise-wide. Built on Big Data architecture to counter endpoint threats at-scale and leveraging tamper-resistant collection for pure behavioral capture on enterprise endpoints, (laptops, servers, workstations, mobile devices) CounterTack dramatically reduces the impact of advanced attacks in real-time, giving teams an opportunity to defend the enterprise before incidents escalate. Based in Waltham, Mass., and with offices in Santa Monica, CA, Sacramento, CA and Washington, D.C., CounterTack is privately-held, and venture-backed by Fairhaven Capital, TenEleven Ventures, EDBI, Goldman Sachs and a group of private investors.

Events