Skip to the main content.
Partner Programs
Already a Partner?
The Value of Partnership with Netenrich

The-Value-of-Partnership-with-Netenrich

 

Netenrich Insights and Research

Security operations

EMA recommends Netenrich for RSA 2023

EMA Names Netenrich a Leading Security Visionary and “Must See” Vendor at RSA 2023

Wondering what to see and who to visit at RSA 2023? Enterprise Management Associates (EMA) named Netenrich one of the top 10 “must see” vendors at...

Keep reading

Want to Optimize Threat Detection & Response? 5 Patterns vs. 500 Rules

One vendor uses 5 patterns, the other uses 500 rules. What’s better?   

Anyone who has configured a SIEM or UEBA (e.g., QRadar, Splunk, ArcSight,...

Keep reading
SOC functionality

Amp up Security: MITRE’s SOC Strategies Go to 11. But Can We Go Higher?

MITRE strategy 10 says measure performance to improve performance. It’s important to set a baseline of where resources spend their time and energy —...

Keep reading

Security operations

EMA recommends Netenrich for RSA 2023

EMA Names Netenrich a Leading Security Visionary and “Must See” Vendor at RSA 2023

Wondering what to see and who to visit at RSA 2023? Enterprise Management Associates (EMA) named Netenrich one of the top 10 “must see” vendors at...

Keep reading

Want to Optimize Threat Detection & Response? 5 Patterns vs. 500 Rules

One vendor uses 5 patterns, the other uses 500 rules. What’s better?    Anyone who has configured a SIEM or UEBA (e.g., QRadar, Splunk, ArcSight,...

Keep reading
SOC functionality

Amp up Security: MITRE’s SOC Strategies Go to 11. But Can We Go Higher?

MITRE strategy 10 says measure performance to improve performance. It’s important to set a baseline of where resources spend their time and energy —...

Keep reading
Cross functional collaboration

How to Improve Cross-functional Collaboration Between the SOC and IT?

As MITRE points out in strategy 9 of its 11 Strategies of a World-class Cybersecurity Operations Center, cross-functional communication is key to a...

Keep reading
single glass of pane for security ops

A Single Pane of Glass Gives a Clear View of Security Operations

Previous strategies in MITRE’s 11 Strategies of a World-class Cybersecurity Operations Center stressed the importance of collecting the right data —...

Keep reading
Principle of security data collection and selection

The Goldilocks Principle for Accurate Security Data Collection

Strategy 6 of MITRE’s 11 Strategies of a World-class Cybersecurity Operations Center focuses on cyber threat intelligence (CTI) data. Strategy 7, on...

Keep reading