Our Blog

Blog Archives

BLOG: Why you don’t want to miss this webinar

By: Stan Herring, Director of Product & Strategy I’m excited about the seminar because it’s an opportunity to share with our Partners in the managed security space, information based on observations from working with thousands of their customers each year. It is evident that the point solution approach to managed security has failed the service […]

WEBINAR: A New Paradigm for Service Providers

Join us on March 21st at 1:00pm CST Subject matter experts from High Wire’s Networks’ Overwatch Managed Security Services & Seceon, Inc., developers of the aiSIEM Platform, will discuss these important security topics: The Changing Security Paradigm A.I., Machine Learning & Behavioral Analysis – Your Competitive Edge Holistic Approach to Managed Security Webinar Registration Sign-up […]

Overwatch Partners with Next Gen. Cloud VPN

High Wire Networks’ Overwatch Managed Security bolsters its holistic security platform, announcing today it now offers a business class, cloud-based VPN service designed to simplify and securely connect employees to cloud-based SaaS and internal network resources. Under the management of the Overwatch team, customers will receive solid security, high reliability and speed for secure remote […]

The ultimate guide to marketing and selling security services

There is nothing more important than a first impression, and in business, your first impression is usually made through marketing, long before you and a potential customer ever meet face to face. We have put together this guide to help you think through the ins and outs of both marketing your services and making the […]

The difference between machine learning and artificial intelligence in your security platform

When one thinks of artificial intelligence or machine learning, the first place people often go to is science fiction–sentient computers, murderous robots, that kind of thing. They’re both very large subjects of study and discovery going back decades. There are whole disciplines devoted to developing artificial intelligence (AI) and machine learning. There are hundreds of […]

6 things to look for in a SOCaaS partner

Hardly a week goes by without another high-profile data security breach hitting the headlines. Just this week, Marriott announced that they discovered an unauthorized data mega-breach that could potentially affect 500 million of its customers. As if that weren’t bad enough, the hotel chain also revealed that the breach may have gone undetected for up […]

The core components of a proper cybersecurity offering for MSPs

While today’s technological advances have certainly facilitated the way many industries do business both locally and globally, it has also paved the way for cybercriminals to exploit weaknesses in the current systems, subsequently causing widespread security breaches or wreaking havoc on a company’s network. MSPs in particular need to be extra vigilant in their cybersecurity […]

Security operations center: Build or outsource?

Modern IT security teams have a challenging job, with a constantly evolving threat landscape, and the realization that only a single cyber attack has to be successful to have a devastating effect on any company. While this is true, many organizations are strapped for sufficient resources – especially when it comes to training and keeping […]

October is National Cybersecurity Month. So What?

Posted on October 25, 2018 by Susanna Song — Leave a comment If you’re wondering, so what? Keep reading. There’s a reason why cybersecurity is no longer just a flashy headline or idea. Your SME clients need greater security measures Seize the opportunity to increase your bottom line in a booming cybersecurity market Don’t start from scratch and build your […]

CYBERATTACK: CRIMINALS MAY ALREADY BE INSIDE YOUR NETWORK

Posted on October 09, 2018 by Stan Herring, Director of Product & Strategy — Leave a comment As a savvy IT manager, you’ve methodically researched and deployed the very latest in firewalls, intrusion detection systems, and endpoint solutions to keep intruders out of your infrastructure. Perimeter defenses are good, but they are not enough in today’s cyber world. We are […]