- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Posts by Mike Toole
We’ve Got to Re-think IT Security
8 min read
| August 20, 2025
This is the first article in a four-part series based on Matthew Warner's cybersecurity manifesto, "The Industry Approach to IT and Cybersecurity Is Not Working." As CEO and...
Read MoreAbout the Author
Mike Toole, Head of Security and IT at Blumira, has over a decade of experience in IT. Prior to joining Blumira, he managed IT for Duo Security and Censys. He has broad experience with a range of IT and security focus areas, including compliance, network design, log monitoring, project management, and cross-platform IT.

Security Trends and Info
6 min read
| May 28, 2025
5 Steps to Minimize Impact After Vendor Security Incidents
Read More
Compliance Security Frameworks and Insurance
6 min read
| August 22, 2024
Navigating the FTC Safeguards Rule: A Guide for Auto Dealerships
Read More
Compliance Security Frameworks and Insurance
8 min read
| August 15, 2024
4 key steps to building an incident response plan
Read More
Security Trends and Info
6 min read
| August 13, 2024
Securing Our Water Supply: Cybersecurity Strategies for Treatment Plants
Read More
Security Trends and Info
6 min read
| August 12, 2024
Five Steps to Overcoming Cyber Complacency
Read More
Security Alerts
3 min read
| December 8, 2023
This Vuln: DeleFriend
Read More
Security How-To
19 min read
| December 23, 2022
How To Use Nmap To Scan For Open Ports
Read More
Security Alerts
3 min read
| March 14, 2022
Vulnerabilities (CVE-2022-26500, 2022-26501) in Veeam
Read More
Security Alerts
5 min read
| February 16, 2022
Google Patches Chrome Zero-Day (CVE-2022-0609)
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.