December 15, 2020

Threat Analysis:  The FireEye + SolarWinds Breach

Cybersecurity firm FireEye announced Tuesday that a sophisticated group of hackers, likely state-sponsored, broke into its network and stole tools the company’s experts developed to simulate real attackers and test the security of its customers. New details continue to emerge daily regarding the FireEye breach. Today we learned that the breach occurred via their supply […]

View More

Check out the Cybersecurity and Compliance Assessment

Armor’s cybersecurity and compliance assessment delivers a baseline assessment for your organization’s overall cybersecurity and compliance posture.

View Assessment

Threat Use Case: Botnet

An internet bot, or “bot,” is a computer that performs various tasks assigned to it by a command and control server. However, bots are also used by malicious threat actors to perform reconnaissance, discover weaknesses, infect computers with malware, or overwhelm servers with bandwidth utilization. Learn how Armor detects and responds to botnets.

View More

Threat Use Case: Ransomware

Ransomware is a destructive malware that uses encryption to seize a victim’s servers, applications, communications systems, and data. Learn how Armor detects and responds to ransomware. Download White Paper

View More

Forrester's Total Economic Impact Report of Armor Anywhere

Discover the true ROI of Armor’s cloud security solution Armor Anywhere.

Check it out

Cloud Security Sample RFP

At Armor, we get a lot of RFPs for cloud security. We have compiled the most commonly asked questions we get and made it available to you. We hope this will make it easier for you as you look for a solution that meets your business needs.

View More