Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Unternehmen verwalten heute eine Vielzahl von Identitäten, die über die eigene Belegschaft hinausgehen. Auftragnehmer, Partner, Saisonarbeiter, Lieferanten und sogar nicht-menschliche Mitarbeiter...
Learn more
Blog
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
Learn more
Executive View
Executive View
PingOne Authorize
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #111: From SIEM to Intelligent SIEM and Beyond
A comprehensive cybersecurity strategy typically includes the use of modern, intelligent Security Information and Event Management (SIEM) platforms. These go far beyond simply aggregating and...
Learn more
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
Webinar Recording
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log...
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Event Recording
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Autonomous networking aims at the appropriate handling of the growing number of devices, machine, sensors and components for which authentication and authorization must be ensured, i.e.,...
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Event Recording
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Traditional network security focuses on perimeter defenses, but many organisations, systems and processes no longer have a clearly defined network perimeter. To protect a modern digital...
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Event Recording
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Identity Governance and Administration (IGA) is critical for ensuring the security of an organization, but it can also be a complex and time-consuming process. Join us for an engaging conversation...
Navigate the DR (Detection & Response) Jungle: EDR, EPDR, XDR, NDR, MDR, ITDR
Event Recording
Navigate the DR (Detection & Response) Jungle: EDR, EPDR, XDR, NDR, MDR, ITDR
ITDR: Is this really something new, given that around 80% of the cyberattacks are identity-related, from password phishing to bypassing MFA? Is it a separate discipline or just a part of XDR...
When SSI Meets IoT: Challenges and Opportunities
Event Recording
When SSI Meets IoT: Challenges and Opportunities
In this session, I will first talk about the design considerations and challenges when applying SSI to IoT, followed by the description of an initiative for creating an embedded SDK for SSI....
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
Event Recording
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
By now, organizations are well aware of the need for better protecting data and application with modern access management and authentication. Thales and Microsoft partner to help organizations...
City of The Hague: Adding Access Control to Microservice Architectures for ZTA
Event Recording
City of The Hague: Adding Access Control to Microservice Architectures for ZTA
The Common Ground movement of the Dutch municipalities is developing innovative solutions for greater interoperability. An important part of this is the data landscape, where functionality is...
Moving on from legacy MFA: Phishing-resistant MFA as a prerequisite for Passwordless
Event Recording
Moving on from legacy MFA: Phishing-resistant MFA as a prerequisite for Passwordless
As long as passwords exist, enterprises are vulnerable to account takeover attacks –yet organizations looking to eliminate passwords may not know where to begin their passwordless journey....
Enforcing Decentralized Authorization in a Multi-Platform API Landscape at Scale
Event Recording
Enforcing Decentralized Authorization in a Multi-Platform API Landscape at Scale
Authorization (AuthZ) and Authentication (AuthN) go hand in hand in ensuring zero-trust in your system landscape. But while scaling identity can be done by centralizing it in an IAM solution,...
1 2 3 4 5 6 7 Next