- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Posts by Matthew Warner
About the Author
Matthew Warner is Chief Technology Officer (CTO) and co-founder of Blumira. Matt brings nearly two decades of IT and cybersecurity experience to his leadership position, and a genuine passion for cybersecurity education. Prior to founding Blumira, he was Director of Security Services at NetWorks Group, a managed security services provider (MSSP) with a focus on compliance and ethical hacking. While at NetWorks Group, Matthew’s team searched for a SIEM that would serve their small to midsize business (SMB) clients well, but found that most products on the market were overly complex, expensive, and difficult to maintain. The concept of Blumira formed when Matthew noticed this significant gap in the market, and he developed a threat detection and response platform that was easy for SMBs to use. After the technology’s internal success at NetWorks Group, Matthew founded Blumira to focus his efforts on growing the platform to scale. Matthew is passionate about helping SMBs, which are often most vulnerable to cyberattacks, improve their security maturity with thoughtful and intentional changes. Through educational opportunities such as webinars, articles, podcasts, conference sessions and more, Matthew shares actionable advice that the most under-resourced and time-strapped teams can undertake. Threat research is another passion of Matthew’s. In late 2021, he led research efforts at Blumira that resulted in the discovery of an additional attack vector in the Log4j vulnerability, offering proactive solutions to help affected entities recover and protect themselves quickly. He works closely with the IT community to determine their pain points and challenges, and develops a product strategy that addresses their specific needs. In 2022, the Globee Cybersecurity Global Excellence Awards program recognized Matthew as CTO of the Year for his leadership and innovative problem-solving, as well as his credible research on Log4j vulnerabilities and notable contributions to Blumira’s 2022 State of Threat Detection and Response Report. Matthew’s dedication to Blumira is as long-lasting as the hedgehog tattoo etched on his leg.

Security Trends and Info
14 min read
| March 11, 2020
Honeypots: Understanding Their Role in Cybersecurity
Read More
Security How-To
15 min read
| March 5, 2020
Guide: How to Replace Your SIEM
Read More
Security Alerts
5 min read
| March 5, 2020
Internet Explorer Groundhog Day Critical Vulnerabilities
Read More
Security Alerts
4 min read
| January 14, 2020
Windows Certificate Spoofing Vulnerability
Read More
Security Alerts
6 min read
| January 13, 2020
What is the Citrix Gateway exploit? How should I respond?
Read More
Compliance Security Frameworks and Insurance
7 min read
| March 25, 2019
Exceeding PCI Requirements to Detect & Respond to Threats
Read More
Security Trends and Info
11 min read
| March 11, 2019
How Much is Your SIEM Solution Costing You?
Read More
Security How-To
8 min read
| March 4, 2019
Detection as an Effective Strategy for Cyber Attacks
Read More
Security How-To
6 min read
| March 4, 2019
How to Determine (And Stick To) a Cybersecurity Budget
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.