Talking CYDERES Engineering with Cassandra Varvel, CYDERES Director of Engineering

Our Teams are Building a More Secure Future.

We have been incredibly excited by the launch of the CYDERES Cloud Native Analytics Platform (CNAP) 2.0 as we continue to bolster the already amazing capabilities of our strategic partner Google Cloud, and their Chronicle offering.

With Google Cloud’s recent announcements around Autonomic Security, the path to modernizing your security programs is clearer than ever. On their recent earnings call, Alphabet and Google CEO Sundar Pichai recently highlighted GC’s security offerings (incl. Chronicle) as their “strongest product portfolio” empowering their incredible growth.

CYDERES is proud to be one of Google Cloud Chronicle’s founding partners and preferred MSSP partners to deliver this solution.

With all of the excitement building around CNAP 2.0, we wanted to illuminate a bit more of the team that is working behind the scenes to develop these game-changing offerings. We recently sat down with Cassandra Varvel, CYDERES Director of Engineering, to talk about CNAP 2.0, the various parts of the Engineering organization, how we integrate with Google Cloud and Chronicle, and more.

CYDERES Engineering Team

Our CYDERES organization is built of many moving parts. Cassandra illuminates one of the pivotal pieces of the broader CYDERES organization: the Engineering Team. Learn about the various positions within the team, and what impresses Cassandra the most about this talented group.

 

CNAP 2.0 Benefits

CYDERES Recently launched CNAP 2.0, improving on the CYDERES Cloud Native Analytics Platform that has already provided so much value for our customers. Cassandra talks about some of the new benefits you can expect with this exciting launch.

 

How Does CNAP Utilize BigQuery?

CYDERES has been in close partnership with Google Cloud, and their Chronicle platform, to help bolster their already incredible threat hunting capabilities, and to provide one of the best answers to the issues of legacy SIEM. Learn more about how CNAP utilizes Google BigQuery and what we bring to the table to help make detecting threats easier than ever.

 

How is CYDERES Different From a Traditional MSSP

We pride ourselves in being different from traditional MSSP offerings. Cassandra talks about some of the reasons as to why we are a better alternative for those looking to move away from legacy managed security offerings.

 

The Power of TEAM

It’s important to build great teams that can trust each other and work well in collaborative environments, and we think our Engineering Team is one of the best in the business. Cassandra talks about some of the best aspects of the teams we have been building at Fishtech and CYDERES.

 

Work on Critical Client Solutions at CYDERES

It can be a daunting task to work in a cybersecurity company, but these challenges can be very rewarding as well. Cassandra talks about the excitement she feels when working on critical client solutions.

 

Join Our Growing CYDERES Team

Interested in joining our CYDERES team? Hear about some of the positions we’re looking to fill, and be sure to check out our Careers page apply for one of our amazing opportunities!

 

 

If you are ready to discuss CNAP, CYDERES Engineering, or any of our other offerings, fill out the form below to be connected with one of our experts.


CYDERES VP Will Aune on Security Operations that Win

Escalating risk + legacy programs – security talent = the nightmare many organizations are currently experiencing.

There is a path forward. As organizations continue to move towards automating and operationalizing their security programs, managed security outcomes are enabling businesses to return focus to growth and customer satisfaction. Traditional hindrances of MSSP’s are in the past when you can leverage the speed to value, cost-efficiency, and full visibility that comes with CYDERES 24/7 security-as-a-service.

With our strategic partner Google Cloud’s recent announcements around Autonomic Security, the path to modernizing your security programs is clearer than ever. On their recent earnings call, Alphabet and Google CEO Sundar Pichai recently highlighted GC’s security offerings (incl. Chronicle) as their “strongest product portfolio” empowering their incredible growth.

CYDERES is proud to be one of Google Cloud Chronicle’s founding partners and preferred MSSP partners to deliver this solution.

How exactly is CYDERES and our proprietary Cloud Native Analytics Platform (CNAP) able to build on Google Chronicle’s success to accelerate SOC and SIEM transformation?

Learn more from CYDERES VP Will Aune as he unpacks key features and use-cases that are winning for our clients.

What is CNAP?

The CYDERES Cloud Native Analytics Platform, or CNAP, is the perfect compliment to security teams that are prepared to monitor and respond to their own alerts. Will gives a quick into CNAP and highlights what CNAP can bring to the table.

 

What are the Benefits of CNAP?

People, process, and technology. Get a quick look at how each of these play into how we deliver value to your organization through our Cloud Native Analytics Platform.

 

What’s the Difference Between CNAP, GSOC, and EMDR?

CNAP, GSOC, and EMDR are three different tiers of our broader detection and response offerings. Each offering corresponds with differing levels of how involved our team is in the response to detected threats. Listen in as Will breaks each one down.

 

The Challenges of Traditional SIEM

Traditional SIEM offerings come with a lot of baggage, and there are many challenges associated with these legacy solutions. Will talks about a few of the challenges of traditional SIEM, and how our solutions help address these obstacles.

 

Our Advantages Over Traditional SIEM

Will dives deeper into a few of our advantages over traditional SIEM offerings, and how our partnership with Google Cloud Chronicle enables our customers to easily overcome past struggles to adequately protect their business in the cloud era.

 

What is CSOC?

One of our fast-growing add-on services is our Cloud Security offering, or our Cloud SOC. Will gets into this offering and how it can bolster your overall security by supplementing your program with a dedicated team focusing on the cloud.

 

Benefits of a SIRT Retainer

Our Security Incident Response Team is not only world class in their professional capabilities, but also provides additional value with our Use It Don’t Lose It policy. If our SIRT services are not utilized during the term of the retainer, we will reach out to see how the funds could best be utilized with our other service offerings across the Fishtech Group organization.

 

 

If you are ready to discuss CNAP, Cloud Security, SIRT, or any of our other offerings, fill out the form below to be connected with one of our experts.


Modern Threats Require Modern Security Operations (Video)

Last week Google Cloud held their first-ever Security Summit featuring fresh insights from industry leaders and interactive sessions with an aim of helping you solve your most critical security challenges.

As a signature sponsor, we were asked to put together a presentation on combating modern security threats with modern security operations. We brought in two of our CYDERES experts, CYDERES Chief Technology Officer Tim MalcomVetter and CYDERES Chief Operating Mike Wyatt, to talk about how CYDERES is helping organizations better prepare for the cyber challenges of the modern era through our talented people, robust and detailed processes, and advanced technologies.

Learn more in our deep dive on how “Modern Threats Require Modern Security Operations“.

 

 

If you are interested in learning more about CYDERES check out some of the following:


Cybereason and CYDERES Partner to Deliver Managed Detection and Response

The Companies will bring an enhanced Managed Detection & Response solution to market for joint customers

Boston, MA / Kansas City, MO (July 22, 2021) — Cybereason, the leader in operation-centric attack protection, and CYDERES, the security-as-a-service division of Fishtech Group and a Top 25 MSSP, today announced a strategic partnership to bring enhanced security detection and response to current and future managed security customers.

Cybereason recently launched The Cybereason Defender’s League, a global partner community designed to reward partners such as CYDERES by increasing their margins and profitability.  CYDERES will be one of Cybereason’s strategic MDR providers helping to reverse the adversary advantage across the cybersecurity risk landscape.

“Combining Cybereason’s award-winning Cybereason Platform with the CYDERES MDR solution will help return defenders to higher ground above threat actors. Cyber attacks on endpoints can be stopped and it is our mission to work closely with CYDERES to make cybercrime and espionage unprofitable,” said Lior Div, CEO and Co-founder, Cybereason.

CYDERES’ and Cybereason’s joint customers will immediately benefit from the Cybereason Defense Platform, which combines endpoint detection and response, next-gen anti-virus, and proactive threat hunting platform to reduce cyber risks. CYDERES’ award-winning MDR solution, market reach and expertise, will enable end users to be better prepared to deal with around the clock cyber risks.

“We believe our customer’s core success is found in automating and operationalizing their security programs cost effectively at scale,” said Gary Fish, CEO and founder of Fishtech Group. “We‘re excited to bring our portfolio to Cybereason’s Defenders League as we work together to help organizations manage risk, detect threats, and respond to security incidents in real-time.”

CYDERES has continued to build off the momentum that has accumulated since the outset of the organization through strategic partnerships, further development of features and additional services to provide a robust 24/7 Security-as-a-Service offering for any computing platform or environment.

 

About CYDERES and Fishtech

Fishtech Group is the #1 cloud native security-as-a-service solutions provider enabling secure and successful business transformation. Born in the cloud and based in Kansas City, Fishtech Group includes the 24-7 Cyber Defense and Response division CYDERES and security analytics firm Haystax in Mclean, VA.

 

About Cybereason

Cybereason is the champion for today’s cyber defenders, providing operation-centric attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated AI-powered detection and response (EDR and XDR), next-gen antivirus (NGAV), Anti-Ransomware Protection and Proactive Threat Hunting to deliver context-rich analysis of every stage of a MalOp™ (malicious operation). Cybereason is a privately held, international company headquartered in Boston with customers in more than 45 countries.

 

Media Contacts:

 

Bill Keeler

Senior Director, Global Public Relations

Cybereason

bill.keeler@cybereason.com

(929) 259-3261

 

Jennie Hanna

Communications & PR Manager

Fishtech Group

jennie.hanna@fishtech.group

(855) 404-8324

QUESTIONS ABOUT THIS SOLUTION?


Introducing: A Managed Service for Proactive Insider Threat Detection & Response

Relentless cyber-attacks and an expanding digital threat landscape caused by a surge in at-home workers during the coronavirus pandemic have left corporate cybersecurity teams overwhelmed and exhausted.

Making matters worse, a parallel increase in insider threat incidents has forced these teams to reckon not just with external risks but also with the growing possibility that trusted individuals from within the organization will cause financial, operational and reputational harm.

CYDERES, the pioneering security-as-a-service division of Fishtech Group, has developed a new service to address these complex and hard-to-detect threats, even while continuing to detect and respond to advanced external cyber threats.

Developed in partnership with Haystax, also a Fishtech business unit, this new Insider Threat Detection & Response (ITDR) managed service analyzes a customer’s existing user and network telemetry to pinpoint and prioritize its riskiest insiders.

An IBM study released in May notes that 40% of the insider attacks it studied between 2018 and 2020 “were detected through alerts generated via an internal monitoring tool.” In almost 10% of cases an outage was the first sign of an insider event, while human reporting was instrumental in 20% of cases. (The remaining 30% were not reported to the study’s researchers.) The study also noted that 40% of incidents involved an employee with privileged access to company assets. In all cases where the insider had administrative access, this elevated access “played a role in the incident itself.”

But what if those different sources could be stitched together and analyzed collectively? The power of ITDR is that it casts a wider net than conventional managed services for data that indicates insider risk. It augments network and device telemetry with a variety of other sources that reveal behavioral anomalies. And ITDR is optimized to focus on the most prevalent insider threat cases, such as data exfiltration, account compromise and risk from individuals who plan to depart the organization or learn they are to be involuntarily terminated (image below).

The analytic result is a composite picture of insider risk, regardless of whether the intent is malicious or the result of unwitting behavior or negligence. This is a crucial analytical capability since accidental breaches and negligence are growing elements in the insider threat landscape – due perhaps to increased stress or carelessness brought on by the pandemic and its consequences.

A recent Harvard Business Review piece noted, for example, that “employees are now 85% more likely to leak or lose files with intellectual property (IP) and other valuable data than they were before the pandemic began.” In a separate survey, 20% of respondents reported security breaches caused by remote workers – a large increase from pre-pandemic levels.

CYDERES is widely known for its human-led and machine-driven security-as-a-service operation, which supplies the people, processes and technology companies need to manage cybersecurity risks, detect threats and respond to incidents in real-time. These 24/7 services act as a ‘force multiplier’ to augment corporate cybersecurity ops teams, helping them shift from reactive monitoring to proactive threat hunting.

Haystax is an award-winning innovator in the application of AI-based risk management analytics to support any type of security mission – from critical infrastructure protection to natural disaster preparedness to insider threat mitigation. Haystax has even provided security alerting and real-time threat analysis to nine of the last 13 Super Bowls, as well as many other major national-security events.

By applying machine learning, probabilistic modeling and other AI techniques to IT telemetry and other data sources, the ITDR service developed by the CYDERES-Haystax team is able to filter out noise and false positives and deliver actionable intelligence to our clients in the form of prioritized and triaged alerts – plus response recommendations and even enhanced training and awareness services.

This seamless blend of cybersecurity firepower and AI-driven behavioral analytics within a single platform, delivered as a managed service, is the best way for organizations to proactively mitigate their riskiest insiders.

Simply put, ITDR focuses on the threats so the corporate team can focus on doing what it does best.

#   #   #

Note: The CYDERES Insider Threat Detection & Response managed service, powered by Haystax, will be launched on July 1. Join us on July 8 for a live interactive webinar that will include an in-depth ITDR briefing and live demonstration of its capabilities. Register here.


Talking Zero Trust, AI/ML, and more with IAM Director Chris Vermilya

Identity and Access Management, or IAM, is the foundation of modern security and is an important part of a mature cybersecurity program. Many important conversations surrounding IAM started last year with the onset of the pandemic, and many foundational pieces of IAM have been put into place for organizations that may have never given cybersecurity a second thought.

We again sat down with Chris Vermilya following our previous interview that covered topics illuminating the basic principles of Identity and Access Management, like the Four Pillars of IAM. This time around, we dove into other areas, like how IAM plays into a Zero Trust Framework, re-thinking how IAM services are managed, the impact of artificial intelligence/machine learning, and more. Check out all of the clips from our interview below.

What is IAM?

At its core, Identity and Access Management (IAM) is the governance of identities and what access they have. Let’s start by reviewing Fishtech’s unique approach to IAM and the four pillars that make up a solid IAM program.

 

Is IAM the Foundation of Modern Security?

Traditional perimeters are obsolete, but how should organizations view their overall IAM security model? Hear Chris Vermilya explain why the “castle and moat” model is dead and exactly how and why a zero-trust approach shows us the way.

 

Getting Started with IAM

Organizations often feel overwhelmed knowing exactly how to start their program or next steps to maturity, but our trusted advisors will help you understand what approach you should take based on your business objectives and risk landscape. Chris describes many common approaches below.

 

How Does IAM Play Into a Zero Trust Framework

Let’s dive deeper into what Zero Trust really means, and more importantly how it works inside an organization’s environment – both from an internal as well as an external identity perspective.

 

Should IAM Be Managed as a Service?

The hypergrowth of the security product landscape has pushed the necessity of as-a-service models which enable organizations to implement, validate, and even automate their tech stack while making the absolute most of every dollar spent. What are best practices around identity solutions from a security-as-a-service perspective?

 

How Does Artificial Intelligence and Machine Learning Impact IAM?

By now most people have realized that AI and Machine Learning are often buzzwords used to hype a product or solution. At the end of the day, what practical value do these solutions drive to an organization? Often only as much as the data that’s available and the processes around how that data informs critical decision-making. Learn more from Chris on how future-focused organizations are actually leveraging AI and Machine Learning in very practical ways.

 

Cross-Functional Cybersecurity Solutions

IAM doesn’t exist in a vacuum but impacts so many different areas of the modern business and is a critical foundation for so many other areas of a mature cybersecurity program. Whether dealing with cloud security, governance and compliance, detection and response, or even the basics of log management, you’ll find identity as a core component and data stream. Chris explains some of the exciting ways these joint solutions are impacting our clients to streamline and automate their programs.

 

Join the IAM Team

We are passionate about leading organizations to a more secure future, realizing that we are aiding organizations by protecting far more than just data alone, but the systems behind that data and most of all, the people those systems impact. Whether it’s in healthcare, finance, energy, retail, or any other sector, robust cybersecurity programs matter to protect real people’s lives and livelihoods. If you share our passion, check out our careers page for our latest open positions and apply today!

 


Better "Insurance" Against Cyberattacks

“In early May, global insurer AXA made a landmark policy decision: The company would stop reimbursing French companies for ransomware payments to cybercriminals.”

Wow. Quite the declaration. This was pulled from a recent article on Dark Reading. Cyber insurance stories like this have been continuing to pop up over the last couple of months highlighting an increasing trend.

Why?

Huge cybercrime stories have been hitting the mainstream every few days. Companies in wide-ranging industries have been hit with progressively more severe cyberattacks, and it’s shaking up the public and corporate landscape in a big way.

It’s hard to definitively say that this is all “unprecedented”. Most anything cyber-related is unprecedented. Though internet-connected devices have integrated themselves into our daily lives at an ever-increasing scale, we have to remember the cyber space is still in its infancy.

Industries that have been slow to work through digital transformation regarding cloud adoption, identity and access management, and mapping to compliance frameworks, for example, are easy targets for increasingly sophisticated attackers.

As insurance companies navigate this whole new digital world, they are beginning to see the severity and maturation of cybercrime, and the severity of cost impact on their own bottom lines. With ransomware payouts continuing to rise, it’s easy to see why re-evaluations on cybercrime coverage are taking place.

The looming potential of a lack of coverage for cybercrime carries a lot of implications for businesses trying to plan for the long term. A lack of stability and a potential for the rug to be pulled on your current plan to help combat the effects of cybercrime can be huge hindrances for growth.

Maybe it’s time to re-evaluate your “insurance” against cybercrime. Let’s dive deeper.

Why Cybersecurity is Better “Insurance” for Your Business

Insurance itself is very reactionary. An event occurs, you file a claim, you are covered. Everything takes place after the inciting incident. This increases the total costs of time and money to an indefinite degree as you look to remediate a cyberattack.

At Fishtech Group, we take a proactive approach cybersecurity to ensure our customers are equipped to detect and respond to cyberattacks with our tailor-made solutions for organizations of all sizes.

With the offerings from our Security-as-a-Service division CYDERES, you can find solutions that are right for your organization, no matter how mature your security posture. Whether you’re looking to find vulnerabilities in your organization to patch up, or if you are looking for a full 24/7 managed security team to seamlessly work with your internal teams, CYDERES can help you adopt a proactive approach to better insure your business against severe costs from cyberattacks.

Our CYDERES solutions include:

These solutions seamlessly work together to protect your organization from the costs associated with significant breaches. What headlines often miss when they report on the ramifications of an attack are the intangible costs associated with recovering from the disruption. We’re looking at costs to time, costs to reputation, costs to morale. These are things traditional insurance can’t protect you from.

When you work with the solutions found at Fishtech Group and CYDERES to equip your organizations to combat cybercrime, you are helping give your business stability in the long-term to continue to grow and avoid the intangible costs of relying on traditional insurance.

Check out the rest of our site to learn more about our wide variety of cybersecurity solutions ready-made to help lead your organization to a more secure future.

If you’re ready to learn more, fill out the form to be connected with one of our experts.

Ready to Learn More About Fishtech Group Cybersecurity Solutions

Fill out the form below to be connected with one of our experts.


CYDERES Cloud Security Interview with Jason Sloderbeck, CYDERES VP of Business Development

Hi, Jason. Thanks for taking the time to talk with us today. Tell us about what you do at Fishtech Group.
 
Hi, I’m Jason Sloderbeck, Vice President of Business Development for CYDERES.

We’re continuing our highlight of our various CYDERES offerings, and today we wanted to give a spotlight on our CYDERES Cloud Security service offering. Could you give us a brief overview of CYDERES Cloud Security?
 
CYDERES Cloud Security provides complete protection for an organization’s infrastructure, applications, and data running in the cloud. Whether an organization uses AWS, GCP, or Azure – or a combination of those – CYDERES Cloud Security provides provide end-to-end security for cloud applications and servers in those environments. That includes everything from 24×7 monitoring and Incident Response, to visibility and compliance reporting. The outcome is that you’ve got a partner to detect and respond to any threat in your cloud environment.

Why would an organization be interested in CYDERES Cloud Security?

The big driver for interest in CYDERES Cloud Security is that securing the Cloud is fundamentally different than the traditional security model. The concept that network configurations and security controls are now Code maintained by a DevOps team – instead of firewalls that are owned by InfoSec is a shift in thinking and it’s challenging for many organizations to get their arms around this. Security professionals are struggling to keep up with the rapidly-changing landscape of Cloud. New services are launched every week by Cloud providers. We’ve found that you really have to be a Developer to make heads or tails out of most the security alerts that come out of your Cloud environment, let alone knowing what to do with those alerts.

How does CYDERES Cloud Security complement the flagship Enterprise Managed Detection and Response offering from CYDERES?

CYDERES Cloud Security is the perfect complement to our Enterprise Managed Detection and Response offering. While EMDR protects data centers and offices and remote employees, Cloud Security extends that to include their cloud infrastructure and applications. So now an organization has a single SOC for everything, all in one place. Our Cloud Security Engineers who work hand in hand with our SOC and we function as an extension of your team, interfacing with DevOps and Security teams to provide comprehensive security for the entire environment.

What are the various capabilities a customer can expect with CYDERES Cloud Security?

There are three key capabilities a customer can expect with CYDERES Cloud Security. First, we’re going to implement and manage a Cloud Management Platform, which provides cloud governance, container security tooling, as well as integration with CI/CD pipelines. Second, we’re going to provide Q&A support for your Security and DevOps teams about best practices, cloud security methodologies, and anything other issues that come up related to cloud security, to help upskill everyone on an ongoing basis. And finally, we provide 24×7 SOC that performs triage, investigation, and response for all of the cloud alerts. So, if a DevOps team pushes out a change that accidentally exposes data to the public during a maintenance window at 3am on a Sunday morning, we’re going to prevent that from happening by automatically rolling it back but also engage live with your teams to work through the issue. And we back that with unlimited Incident Response for our clients’ cloud environments.

Thanks for taking the time to speak with us today.

Ready to Learn More About CYDERES Cloud Security?

Fill out the form below to be connected with one of our experts.


Security Operations Interview with Josh Culotta, CYDERES Director of Security Operations, at CDC 2

When we first started planning our second Cyber Defense Center, our goal was to create another world class space to house world class talent in the vein of our original Cyber Defense Center in Kansas City. We're a few months a way from the anniversary of the opening of CDC 2 in Northwest Arkansas, and we're so pleased with what our team has been able to accomplish in such short time. We visited CDC 2 earlier this year and sat down to talk with CYDERES Director of Security Operations Josh Culotta to talk all about our space in Northwest Arkansas, today's biggest threat vectors, what makes CYDERES different, the common challenges CISOs are seeing, and more. Check out a few clips from our interview below.

Our Proactive Approach to Today's Biggest Threat Vectors

At CYDERES, we are constantly staying on top of today's biggest threat vectors to ensure our customers are protected. Josh explains how we take a proactive, rather than reactive, approach the challenges of today.

 

https://vimeo.com/531010248

What Sets CYDERES Apart?

Managed Security Service Provider, or MSSP, have become a four letter word with negative connotations. Our aim at CYDERES is to reclaim the name and make MSSPs elite and ready for the rigors of modern cybersecurity. Josh talks more about what CYDERES is doing to make that happen.

 

https://vimeo.com/541294633

Can CYDERES Augment My Existing SOC

What about customers that already have a SOC? Can CYDERES still provide value and work alongside already established infrastructure? Absolutely. CYDERES was tailor-made to be a seamless addition to any organization's security team. We take a technology agnostic approach to better align ourselves with any team, from early upstarts to well-established veterans.

 

https://vimeo.com/540704713

Biggest Challenge Facing CISOs Today

With the onset of the pandemic, remote work took on a prominent role in the daily operations of organizations across the globe. With the size and scope of remote operations, and the rapid speed in which the operations were stood up, many organizations were scrambling to make sure their employees and their devices were secure. Josh highlights this challenge as one of the biggest still facing CISOs today, even as many start to transition back to in-person work.

 

https://vimeo.com/531021578

Why Long-Term Telemetry Storage is a Must

Many cybersecurity professionals have been conditioned against significant telemetry storage due to cost. With the Chronicle platform, pricing is based off of headcount, not data, which allows organizations to store and analyze exponentially more telemetry. Josh talks about the practicality of long-term telemetry storage, and the use cases for this approach.

 

https://vimeo.com/541131085

Overlooked Costs When Building Your Own SOC

The costs of building your own SOC can be significant, and these costs go well beyond headcount. Josh dives into many of the overlooked costs when building your own SOC.

 

https://vimeo.com/541107726

Recommendations for Small Businesses

When small businesses are looking to ramp up their security capabilities, it can be quite daunting due to cost and personnel requirements. Josh talks about how CYDERES can help get you up to speed faster, while allowing you to continue to focus on your business.

 

https://vimeo.com/541170718

What is GSOC?

One of our core CYDERES offerings is our Global Security Operations Center, or GSOC. Learn more about what GSOC can bring to the table for your organization.

 

https://vimeo.com/540825351

The Benefits of SOC Prime

We recently announced a deeper partnership with SOC Prime to further bolster the capabilities of our Managed Detection and Response offerings. Josh gets into specifics about the benefits of SOC Prime.

 

https://vimeo.com/541651740

Bridging the Gap Between Security and Operations

Security and Operations have traditionally been significantly siloed. How do we increase efficiencies across the board with the unification of these important pillars? Josh talks about bridging this gap.

 

https://vimeo.com/540815473

Tips for Working with a CISO

Whether you have a direct or indirect line to a CISO, there are a few things to keep in mind to keep communication on operations flowing smoothly. Josh shares his tips on working with a CISO.

 

https://vimeo.com/531042138

What Does Normal Look Like for Your Business Going Forward?

As we all continue to navigate the business landscape after a tumultuous year, the question starts to become "what does normal look like?" Josh addresses these questions from a security perspective.

 

https://vimeo.com/540831114

Join the Fishtech Team!

Our second Cyber Defense Center is just getting started, and we're looking to grow. If you're interested in joining our team, in Arkansas, or anywhere across the country, don't hesitate to reach out, or head on over to our Careers page to see all of our current openings.[/vc_column_text]

Ready to learn more? Fill out the form below to be connected with one of our experts.

 

https://vimeo.com/540712559/b22d3224b3

 

[/vc_column][/vc_row]


How Organizations are Optimizing their AWS Costs

Every day, our customers ask for help in seeking a better understanding of Amazon Web Services’ (AWS) complex and intricate pricing structure and how to leverage best practices around optimizing costs.

Cloud administrators, technical executives and FinOps managers make decisions every day to make their cloud usage as efficient as possible. But how do you know when a decision could compromise either performance or business continuity?

Some often-neglected keys to cost optimization include combining real-time visibility with the ability to instantly manage power schedules, control unused and idle services, and leaning into hundreds of reserve instance opportunities.

One partner we see providing tons of value (and cost savings) in this effort is CloudBolt Software. They recently (2020) acquired Kumolus, an AWS Advanced Partner, and one of the few companies with an AWS Competency certification in Cloud Management Tool (CMT), to accelerate their expansion and capabilities, not only around cost optimization, but also public cloud security.

To celebrate the addition of Kumolus, the CloudBolt team has capitalized on their newly-added expertise to create the Ultimate Guide to AWS Cloud Cost Optimization.

This guide helps advanced users gain an in-depth understanding of the key AWS concepts, service pricing, and best practices related cloud cost optimization. It covers areas of interest including Elastic Block Storage, EC2 Spot Instances, Bill Analysis, Cost Allocation Tags and so much more.

Each chapter contains charts and graphs to illustrate real-life examples of how the information can be used. And best of all, it’s written in a way that boils down difficult, complex concepts into an easy-to-consume format.

We are proud to count CloudBolt as a valued partner and applaud their initiative for freely sharing their experience to promote user awareness of these critical concepts for your business.

You can access the guide here and bookmark relevant chapters to your business, or download a full PDF copy here. It’s all free, you don’t even have to fill out a form. Check it out, and start using the information to optimize your AWS environment, today.