Please turn on your JavaScript for this page to function normally.
Delta Risk partners with VMware Carbon Black to improve endpoint protection

Delta Risk, a leading provider of SOC-as-a-Service and security services, announced that it has expanded its partnership with VMware Carbon Black, a leader in cloud-delivered, …

Microsoft Defender ATP integrates with Delta Risk’s SOAR platform, ActiveEye

Delta Risk, a leading provider of SOC-as-a-Service and security services, announced the integration of Microsoft Defender Advanced Threat Protection (Defender ATP) with its …

Delta Risk and CrowdStrike help clients strengthen their cyber security posture to detect and prevent attacks

Delta Risk, a leading provider of SOC-as-a-Service and security services, announced that it has joined the CrowdStrike Elevate Partner Program. Delta Risk will offer …

Delta Risk provides cloud configuration and security monitoring for Rhythmic Technologies clients

Cloud application and infrastructure misconfigurations are behind some of the biggest data breaches this year. To help combat this problem, Delta Risk, a leading provider of …

Delta Risk leverages Crypsis Group’s expertise in incident response and risk management

Delta Risk, a leading provider of SOC-as-a-Service and security services, announced that it has partnered with The Crypsis Group, a leading incident response, risk management, …

Splunk Mission Control
New infosec products of the week: October 25, 2019

Delta Risk ActiveEye 2.0 eliminates more than 95% of false positives With a focus on advanced security automation, the ActiveEye 2.0 platform eliminates more than 95 percent …

Delta Risk ActiveEye 2.0 eliminates more than 95% of false positives

Delta Risk, a leading provider of SOC-as-a-Service and security services, announced the release of version 2.0 of its cloud-native Security Orchestration and Automation (SOAR) …

cloud
What is and what is not working for security operations teams in securing cloud data

Security professionals continue to face a number of major challenges as more organizations move legacy IT operations to cloud infrastructure and applications, and traditional …

Don't miss

Cybersecurity news