- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Security How-To

Security How-To
4 min read
| February 14, 2022
Cover Your Assets: Performing a Successful Security Inventory
Read More
Security How-To
5 min read
| February 8, 2022
Detecting DNS Tunneling: The Light At The End
Read More
Security How-To
9 min read
| February 3, 2022
Email Forwarding Security Risk (And How to Detect)
Read More
Security How-To
6 min read
| January 26, 2022
Shortening Ransomware Dwell Time Requires Fast Detection
Read More
Security How-To
4 min read
| December 21, 2021
Catch a Pentester: Putting Your SIEM to the Test
Read More
Security How-To
7 min read
| December 7, 2021
How To Detect AS-REP Roasting With Blumira
Read More
Security How-To
19 min read
| December 1, 2021
What To Log In A SIEM: Logging Best Practices
Read More
Security How-To
3 min read
| November 23, 2021
How To Mitigate The Latest Windows Vulnerabilities
Read More
Security How-To
4 min read
| October 29, 2021
Group Policy Gotchas: GPO Settings That Expose Your Environment
Read More
Security How-To
10 min read
| October 25, 2021
Best Practices For Configuring Firewall Rules
Read More
Security How-To
4 min read
| October 19, 2021
Fireside Chat: Starting From Security Square One
Read More
Security How-To
12 min read
| October 18, 2021
Why Antivirus Is Not Enough To Prevent Ransomware
Read More
Security How-To
2 min read
| September 28, 2021
Stay Ahead in Ransomware Crisis
Read More
Security How-To
10 min read
| September 16, 2021
5 Tips to Combat Cybersecurity Alert Fatigue
Read More
Security How-To
2 min read
| September 14, 2021
5 VMware Carbon Black Detections to Prevent Ransomware
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.