Prepare for Lift Off! Sift Space Community Coming Soon

Red Sift is excited to announce the coming launch of our new customer community Sift Space – a place to connect, share and learn.

Inspired by space missions, the new community space is designed to help customers get the most out of Red Sift’s platform and apps, an all new knowledge base, as well as engage in thought leadership, technical, and cyber security conversations with cyber security experts, peers and Red Sift subject matter experts.

Sift Space was developed directly from the feedback provided in the 2022 customer survey. It takes into account customer feedback and requests, including interest in training and enablement, exclusive customer-only events, regular interactions and an active relationship with the Red Sift Customer Success team, access to technical support and importantly being part of the wider Red Sift community of cybersecurity leaders and experts.

Of course we want to recognize and support our customers so the community is also the place where we will be celebrating loyalty. We’ll do this through badges, awards and giveaways.

Claudia Belardo, VP Customer Success at Red Sift describes the Sift Space community as the exclusive place where Red Sift’s supporting cyber security experts can experience Red Sift’s ‘See. Solve. Secure’ promise 24/7.  

She adds, “Bringing together our vibrant customer community into a dynamic environment like Sift Space has been a driving ambition of mine – and I can’t wait for lift off!”

Sift Space Community Highlights

  • Connect with other cybersecurity professionals and Red Sift Subject Matter Experts (SMEs) in engaging thought leadership and technical discussions
  • Join product and vertical groups
  • Access knowledge, ask questions, start discussions, collaborate on best practices and special interests
  • Learn and share
  • Seek answers/solutions/recommendations
  • Provide product feedback

Learn more: What Can You  Expect From Sift Space

The Sift Space community is open any time of day for users to engage. Community members can post questions to the community for peer replies and answers, follow discussions, search the Red Sift knowledge base, find onboarding user guides, and follow their account’s cases. Plus, engaging with the community will help users find valuable information to utilize and optimize the Red Sift platform and solutions to their fullest potential. 

For both security leaders and hands-on practitioners the community is a place to meet many of our Red Sift experts as they moderate top interest discussions and share valuable input.  

We’ve added our incident submit form to allow customers to reach the Customer Success Engineer team with more complex or private concerns, issues and questions. Users can also follow active and closed incidents with our technical customer success engineers.  Customers should check their service contact for their level of entitlement.  

Finally, Sift Space is about celebrating the hard work of the cybersecurity community. Our goal is to make the community experience informative, enriching and enjoyable. The more you put in the more you’ll get out in terms of learning, relationships and rewards.

PUBLISHED BY

Susan Verona

14 Mar. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more
ASM

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more