
Cutting the Noise
As businesses expand to all geographies and time zones, the task of defending an ever-enlarging and ever-changing perimeter becomes increasingly daunting. Infrastructure endpoints, workstations in particular, are critical points of attack – and defense.

How Agents Clean Up the Mess
Agentless SIEM deployments have a certain appeal, after all the fewer installs the better… right? Not so fast. When budget, scalability, scope, throughput, performance and security are a concern, as they should be, you need to think about agents.

The Workstation Monitoring Imperative
You’ve just discovered a breach and are hunting down the forensic chain of events of an APT when the trail goes cold. Why? Because it started on a workstation. Learn how to cover them.

Log Visibility Without the Hidden Costs: How Snare Eliminates the Cold Storage Compromise
July 22, 2025/by Nina Mule
Why Security Teams Choose the Snare Suite
July 9, 2025/by Gino Cobarrubias
Why Storage Costs of Security Data is a Barrier to Cybersecurity and Compliance – And How Snare Can Change That
July 3, 2025/by Gino Cobarrubias
Observing tomorrow’s cybercriminals with the global standard for centralised log management
November 12, 2023/by Gino Cobarrubias
How Australian Organisations Can Build More Resilient Systems to Reduce Cyber Risk
October 17, 2023/by Gino Cobarrubias
Using Snare to Detect Volt Typhoon APT
…
May 30, 2023/by Paige MontgomeryProducts
Recent Posts
- The 5 Logs Most Often Missing During Breach Investigations
- The Cyber Volume Crisis: Why Modern Security Teams Are Drowning in Data — and What to Do About It
- Snare’s ISO 27001 Certification & Commitment to Cyber Security Continues in 2025
- Visibility Starts at the Source: How Snare Agent v5.10 Standardises Global Security Operations
- Cyber Resilience: When “Detect & Recover” Beats “Prevent & Protect”
- How the Cyber 4Cs Help Security Leaders Build a Resilient Logging Strategy


