Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution
Join the biggest international cybersecurity conference in Germany and meet 500 security practitioners. Participate in four interactive tracks to get insights on Quantum Computing, Supply Chain...
Learn more
Blog
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Learn more
Leadership Brief
Leadership Brief
Machine Customers - The Impact of Consumer Bots on Customer Journeys
Machine customers are already present in many markets, driven by trends such as IoT. This leadership brief gives an overview on how to prepare to satisfy the needs of consumer bots and other...
Learn more
Event Recording
Event Recording
Only Those Who Know the Dangers Can Protect Themselves
How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers...
Learn more
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the...
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Security Orchestration Automation and Response (SOAR)
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
Debunking Common Myths About XDR
Event Recording
Debunking Common Myths About XDR
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Only Those Who Know the Dangers Can Protect Themselves
Event Recording
Only Those Who Know the Dangers Can Protect Themselves
How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers...
Rethinking Cybersecurity From the Human Element Point of View
Event Recording
Rethinking Cybersecurity From the Human Element Point of View
Over simplifying, IT security means defending the IT systems from threats procured by cybercriminals. Their targets are, for example, the manipulation of systems, the extorsion or exfiltration of...
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Event Recording
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Cyber Security traditionally has been seen as the domain of Technology, with an expectation that the solution for cyber resilience has to be provided by IT – and we happily accepted this...
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Event Recording
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Protecting Web Applications Amid Severe Staff Shortages
Webinar Recording
Protecting Web Applications Amid Severe Staff Shortages
Organizations are more dependent than ever on web applications for doing business with partners and customers, which means that protecting web applications has become business critical. But many...
1 2 3 4 5 6 7 Next