Arctic Wolf Concierge SIEM™

Get actionable security intelligence from Concierge Security Engineers without the complexity and cost of managing a traditional Security Information and Event Management (SIEM) solution.

Arctic Wolf provides a managed SIEM service. We collect your security event information and the context around it. Our security engineers analyze mountains of data to reduce false positives. The end result is actionable security intelligence working as an extension of your IT security team.

Staples announces possible payment card theft

Staples announces possible payment card theft

Oct 22 2014

Staples revealed this week that it is investigating the possibility that payment card information from the store's customers was compromised in a breach. The office supply chain has more than 1,800…

See full news release

YouTube infiltrated by malvertising network

YouTube infiltrated by malvertising network

Users of the popular video sharing site YouTube are being warned this week that malicious ads are lurking on the site, putting millions of visitors at risk of being infected…

See full news release

Cybercriminals using fear of Ebola to expand malware network

Cybercriminals using fear of Ebola to expand malware network

Oct 20 2014

As fears about the Ebola virus continue to rise, cybercriminals are beginning to leverage public concern to trick victims into clicking on malicious links. The lack of knowledge and fear…

See full news release

Kmart reveals credit card numbers were stolen during September breach

Kmart reveals credit card numbers were stolen during September breach

Oct 16 2014

This week Sears revealed in a filing with the Securities and Exchange Commission that a security breach that occurred in September most likely caused customer payment card information to be…

See full news release

Network of cybercriminals found stealing U.S. government data

Network of cybercriminals found stealing U.S. government data

Oct 15 2014

It was discovered this week that a malware campaign has been targeting government organizations and officials for almost five years. Researchers with iSIGHT partners have examined the code used in the…

See full news release