Trusted cybersecurity for an uncertain world.

On-Demand Webinar: Inside the Perimeter: Security Event Monitoring

Recorded: March 2020

When viruses, trojans and malware first became a thing, the security guidance given was to establish a strong perimeter. This military approach dating back to the early years of war made sense – create a safe place for valuable assets to be stored while providing 360-degree protection around them. In networking terms, it meant to set up firewalls to protect your network and monitor them for potential attacks.

Fast forward to today and the cybersecurity battlefield has changed. The threat vectors have become more numerous and complex. As cybercriminals take advantage of these new points of entry, organizations have to be prepared to monitor more than just the perimeter. Unfortunately, this leads to organizations adding one-off solutions to meet these new challenges and being stuck with yet another technology and vendor relationship to manage.

SilverSky now offers Security Monitoring which helps to monitor servers inside your perimeter against threats like cache poisoning, network floods, LDAP reconnaissance, PowerSploit activity, and data exfiltration.

In this presentation, Kyle Benson explains how to be prepared for threats inside the perimeter and steps you can take now to be more prepared.

Speaker: Kyle Benson



Managed Security Services

Your around the clock SOC.

Managed Endpoint Detection and Response

Some attacks will succeed. Don’t worry—we have you.

Managed Detection and Response

Augment your IT team using our expertise and the latest technologies.

Email Protection Suite

Defending against the leading attack vector.

Cloud Email and Collaboration

More than ever, the cloud is essential.

Incident Response Readiness

When a breach occurs, you’ll be ready.

Compliance & Risk Services

Take the next steps on your cybersecurity maturity journey.

Trusted Cybersecurity for an Uncertain World

Understand, detect, and effectively respond to threats, reduce business risk and improve the return on your security investment.

Financial Services

We comply with the same regulations you do.


Affordable defenses for a sector under attack.


SilverSky stands between cybercriminals and your customers’ data.

Benefits of a Single Vendor Relationship

The Cooperative Bank of Cape Cod found itself especially appreciative of SilverSky’s comprehensive solution set—particularly as they rapidly, but securely, enabled employees to work remotely.


Automated Cybersecurity Examination Tool


Health Insurance Portability and Accountability Act


Payment Card Industry Data Security Standard


Federal Financial Institutions Examination Council


Gramm-Leach-Bliley Act

ACET Helps Credit Unions Further Their Missions

Learn how going all in for ACET protects customers and the health of community-based financial services.


Articles, guides, ebooks, tools, on-demand webinars, case studies, and more. Explore a range of topics.

Press & Events

Press releases, upcoming conferences and trade shows, and future and on-demand webinars

Revisiting Cybersecurity’s Delicate Balance

Learn how CISOs are rebalancing prevention, detection, and response for stronger cyber defenses.

About Us

Trusted cybersecurity for an uncertain world.


Looking to join the fight against cybercriminals?

Security Management Console

Comprehensive customer portal for state of devices, reports for compliance, support tickets, and more.

Transforming Cybersecurity Culture from Corner Offices to Cubicles

Executives are increasingly thinking about cybersecurity management in a similar manner as they would any other risk assessment. This guide is here to help.