UncommonX Blog

Learn how UncommonX solutions are making a major impact on the industry and our customers. Don’t forget to subscibe to our X Factor Files newsletter to receive the latest news and updates.

Subscribe →
cybersecurity laptop half open

3 min read

EDR vs. XDR: What's the Difference?

Enterprise data protection can be a complex undertaking, and there are a variety of approaches that organizations can take to secure their data. One key decision that organizations must make is whether to use EDR solutions or XDR solutions. But...

Read More
lock on keyboard for XDR security

3 min read

What Is XDR Security and Why Should Your Business Care?

What is XDR security? The term XDR (extended detection and response) was first used in 2018 to describe a new technology that goes beyond traditional...

Read More
finger pointing to xdr security on computer

3 min read

MDR vs. XDR: What’s the Difference?

MDR vs. XDR: Which one is right for your business? While both are powerful security solutions for businesses, they each have their own uses and...

Read More

3 min read

XDR vs. SIEM: What’s the Difference?

XDR vs. SIEM: which one is right for your business? Both XDR and SIEM are powerful security tools that help capture data sources such as network data...

Read More

2 min read

How to Configure Cisco Port Security

Port security is a layer two traffic control feature on Cisco Catalyst switches. It enables administrators to configure individual switch ports to...

Read More

3 min read

Technology Alone is a Weak Defense Against Cyber Threats

Since prehistoric times, humankind has developed tools to make their lives easier, more productive, and even safer. Yet those tools didn’t operate on...

Read More
Woman at computer monitoring displays.

3 min read

What to Look For in a Managed Detection and Response Provider / Part 2

This is the second of a two-part series. For the first part, click here.

Read More