Blog

The activereach blog offers education and inspiration in #security and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

Why XDR Should Be on Your Roadmap for SOC Success

Fighting modern adversaries requires having a modern security operations center (SOC), especially as organizations move to the cloud. To protect their estates against tomorrow’s threats, security professionals have often turned to more data sources and adding more security monitoring tools in their operations, both in the pursuit of maximizing their attack surface visibility and reducing time to detect and respond to threats.

more →

Blog

Our Virtual Wine Tasting Was a Corker!

Sharon Holland

On 13th October activereach co-hosted with Cymulate, a leader in Extended Security Posture Management (XSPM) and Gartner Cool Vendor, a virtual wine tasting and industry roundtable.

Hosted online, over 25 Infosec professionals from various industries joined us to sample fantastic wines as well as discover why CIOs and CISOs should not make cybersecurity assumptions and need to constantly re-evaluate which elements of their cybersecurity solution stack they should keep, replace, or eliminate.

more →

Blog

Simplify and Scale Zero Trust Integrations

Sharon Holland

We’ve seen major shifts in the digital landscape that have far reaching implications on organizations around the world. These include the widespread adoption of hybrid work, the accelerated migration from on-premise to cloud resources, and the exponential increase of data in the cloud.

While organizations gain many benefits from leveraging new cloud technologies, there are several challenges that arise with new ways of doing business, including the increasing complexity of an ever-expanding attack surface, the rising number of attacks targeting web and cloud apps, and protecting users, devices, and data regardless of where they reside.

more →

Blog

Addressing Insider Risk with activereach and Netskope’s Intelligent SSE

We address insider rIsk using protections across three key technologies: data protection, contextual risk-based access controls, and analytics. This blend of protection helps organizations take control over the risk that insiders pose in a manner which no combination of point solutions could possibly do. That’s because with Netskope Intelligent SSE our protections work together, with single-pass policy enforcement and the capabilities to visualize, understand, and control insider risk.

more →