New Threat Research: Uncovering Adversarial LDAP Tradecraft

Read Threat Research

Search

Case Studies

See how we protect businesses just like yours.

Featured Case Studies

Threat Hunter finds renamed system utilities by file hash to uncover multiple attacks   

Summary:  Threat hunting is a vital but often misunderstood practice for organizations and security teams. Curiosity is one of the driving forces behind any…

Read More

View All Case Studies

Threat Hunter finds renamed system utilities by file hash to uncover multiple attacks   

Read More

Town of North Haven leverages human expertise and MDR technology to keep its services running smoothly for its citizens 

Read More

Insurance company keeps customer data safe from threat actors with help from Binary Defense SIEM management

Read More

Electricity provider finds value in threat hunting partnership with Binary Defense

Read More

Binary Defense Threat Hunters use USM Anywhere to detect and respond to threats

Read More

Aluminum boat manufacturer enlists Binary Defense to help protect from ransomware and malware attacks

Read More

Binary Defense helps one-person IT staff keep marketing agency data secure

Read More

Threat hunting team finds malware attack in progress at large technology firm

Read More

Global retail technology provider finds true partnership with Binary Defense

Read More

Binary Defense Helps Law Firm Improve Cybersecurity by Installing and Tuning SIEM

Read More

Counterintelligence Team Uncovers Potential Attack On MSP And Takes Quick Action

Read More

Technology Firm Relies On Binary Defense To Monitor And Detect Cyberattacks

Read More