• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

Delta Risk’s ActiveEye 2.0 Uses Automation to Keep Your Network Safe

Cyber security firm's nex generation SOC-as-a-service solution called ActiveEye 2.0 focuses on advanced security automation to take the load off IT teams.

October 24, 2019 Zachary Comeau Leave a Comment

ActiveEye 2.0

Cybersecurity firm Delta Risk has released its next-generation cloud-based ActiveEye platform that the company says is more efficient and can eliminate more than 95% of false positives by leaning heavily on automation.

The platform has an advanced focus on security automation that can sift through daily security alerts generated by next-generation endpoint detection and response solutions, security information and event management devices and software, cloud applications and cloud infrastructure, the company said in a press release Tuesday.

Delta Risk said the new version features compliant existing capabilities for endpoint, network and cloud security and work well with Amazon Web Services, Microsoft Office 365, Azure, Google G Suite, Box and other platforms and devices.

ActiveEye Managed Security Platform Overview from Delta Risk on Vimeo.

The new ActiveEye 2.0 features complement existing capabilities for endpoint, network, and cloud security, including monitoring and management for Amazon Web Services (AWS), Microsoft Office 365 and Azure, Google G Suite, Box, as well as other platforms and devices.

According to Delta Risk, ActiveEye 2.0 solves the problem of organizations struggling to staff IT departments to manage complex legacy security software. Traditional managed security service providers can sometimes be opaque to the user.

Related: Solving the Headaches of Network Security in Wireless Collaboration

In a statement, Vice President of Product Strategy John Hawley said despite the advancement of network security tools, the average organization lacks the skills, expertise, manpower and time to deploy them.

“ActiveEye 2.0 allows our security operations center (SOC) analysts to focus on the most important threats to better protect our customers and take that load off their teams,” he said.

New features in the platform include:

  • Virtual analyst playbook orchestration that reduces most false positives and enables analysts to focus on more complex and critical alerts, thereby speeding up incident response times
  • Personalized customer notebooks that allow customers to quickly share information with the Delta Risk security team about what’s important or what to ignore in their environment.
  • Key performance indicator dashboards that let customers see critical metrics across their entire environment at a glance and create easy-to-understand executive reports.
  • Virtual analyst response automation that lets analysts take action directly from the ActiveEye platform to resolve threats and speed response times.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Automation, Cyber Security, Network Security

Related Content:

  • FTC Ring FTC Accuses Ring of Watching Private Videos, Poor…
  • Threat Detection Trends, 2023 Hacking Trends, Expel New Email Rules, MFA Bypass Are Top Hacking…
  • Lucidworks logo Lucidworks Strengthens Partnership with Google Cloud
  • Crowdstrike Charlotte AI CrowdStrike Launches Virtual Security Assistant Charlotte AI

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Download TechDecisions' Blueprint Series report on Security Awareness now!
Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared t...

Workplace Collaboration Tools for Corporate Spaces
Workplace Collaboration Tools for Corporate Spaces

From lobbies and shared spaces to conference rooms and multipurpose facilities, you need high-performing AV technology to effectively share informa...

ChatGPT, generative AI, enterprise, workplace
Blueprint Series: ChatGPT and Generative AI in the Workplace

This latest release of the TechDecisions Blueprint Series explores the new phenomenon of tools such as ChatGPT and how IT leaders should go about d...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.