by Ken Tola | Sep 28, 2016 | Our Technology
Can Bear Add Value To SIEMs? If you are not aware, there is a large and mature industry in the enterprise world called Security Incident and Event Management (SIEM) and these vendors are very good at finding anomalous activity in large sets of data. Most layer...
by Ken Tola | Aug 23, 2016 | Our Technology
The Bear Flow Bear provides a unified client agent that works across operating systems and numerous types of devices from bare metal to the cloud. Within this general paradigm, Bear enables Active Directory-like authentication, authorization, and auditing/accounting....
by Ken Tola | Aug 16, 2016 | Our Technology, Security
Securing Smart Devices To protect the rapidly growing edges of large networks like those found in the IoT, it is important to work with a new paradigm. This blog post will first cover the basic tenants of that model and then show how Bear secures the edge. New...
by Ken Tola | Aug 15, 2016 | Our Technology
Distributing The Load One of the more interesting components of Bear is the use of Distributed Workflows. In this post, we are going to go over some of the basic functions and show how these workflows can be used to reduce network traffic and increase operational...
Recent Comments