Blog
Endpoint Detection & Response
Sherlocked Security – Endpoint Detection & Response (EDR) Integration &...
Wireless Security & Rogue Access Point (AP) Detection
Sherlocked Security – Wireless Security & Rogue Access Point (AP)...
VPN & Zero Trust Network Access
Sherlocked Security – VPN & Zero Trust Network Access (ZTNA)...
Software-Defined Perimeter
Sherlocked Security – Software-Defined Perimeter (SDP) Architecture & Deployment Enable...
Segmentation & Micro-Segmentation Review
Sherlocked Security – Segmentation & Micro-Segmentation Review Divide and Protect:...
Next-Gen Firewall_IPS Tuning
Sherlocked Security – Next-Gen Firewall / IPS Tuning Maximize Detection,...
Network Device Configuration Review
Sherlocked Security – Network Device Configuration Review Secure the Core:...
DDoS Testing & Mitigation Advisory
Sherlocked Security – DDoS Testing & Mitigation Advisory Resilience Under...
Network Architecture Review
Sherlocked Security – Network Architecture Review Assess and Fortify Your...
Network Access Control (NAC) Setup
Sherlocked Security – Network Access Control (NAC) Setup Control Who,...