- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Posts by Thu Pham
About the Author
Thu has over 15 years of experience in the information security and technology industries. Prior to joining Blumira, she held both content and product marketing roles at Duo Security, leading go-to-market (GTM) and messaging for the portfolio solution Cisco Zero Trust. She holds a bachelor of science degree in journalism and advertising.

Security How-To
6 min read
| August 3, 2020
Test SIEM Detections for Password Spraying
Read More
Security Alerts
7 min read
| July 22, 2020
Detect and Protect Against Emotet Malware
Read More
Product Updates
9 min read
| July 21, 2020
Now Available: Blumira’s Advanced Security Search & Reporting
Read More
Compliance Security Frameworks and Insurance
11 min read
| July 14, 2020
Is Your SIEM Deployment Failing? The Hidden Costs of SIEMs
Read More
Security How-To
6 min read
| July 9, 2020
How to Reduce Your Overall Attack Surface With Geoblocking
Read More
Security Trends and Info
6 min read
| June 29, 2020
Cyber Warfare, Part 3: InfoSec Strategy, Principles & Biometrics
Read More
Compliance Security Frameworks and Insurance
5 min read
| June 25, 2020
OWASP Top 10: Automate Logging & Monitoring for Application Security
Read More
Security Trends and Info
3 min read
| June 25, 2020
Intro to Windows Security Logs - On-Demand
Read More
Security Trends and Info
5 min read
| June 24, 2020
Cyber Warfare, Part 2: Deep Fakes, War Strategy & Scaling Security
Read More
Security Alerts
5 min read
| June 23, 2020
RDP Risk: Ransomware Targets Manufacturing and Energy Plants
Read More
Security Trends and Info
5 min read
| June 17, 2020
Cyber Warfare 1: BYOD, Social Influence & Auto Vehicles
Read More
Security How-To
1 min read
| June 16, 2020
How to Increase Windows Log Visibility: A Tutorial
Read More
Security Trends and Info
5 min read
| June 16, 2020
Threat Detection & Response Maturity: Modern Cybersecurity Practices, Part 3
Read More
Security Alerts
9 min read
| June 15, 2020
Top Security Threats: Lateral Movement
Read More
Security Alerts
4 min read
| June 11, 2020
Common Threat Vectors & Industrial Control Systems (ICS): Modern Cybersecurity Practices, Part 2
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.