Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution
Join the biggest international cybersecurity conference in Germany and meet 500 security practitioners. Participate in four interactive tracks to get insights on Quantum Computing, Supply Chain...
Learn more
Blog
Blog
Malicious Actors Exploiting Coronavirus Fears
Security researchers are discovering a number of malicious attacks designed to exploit public fears around COVID-19, more commonly just called coronavirus. The attacks to date take two major...
Learn more
Leadership Compass
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Learn more
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the...
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Security Orchestration Automation and Response (SOAR)
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
PingOne Authorize
Executive View
PingOne Authorize
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...
Micro Focus ArcSight
Executive View
Micro Focus ArcSight
ArcSight is a modern SIEM solution that provides an advanced security analytics platform for storing, analyzing, and visualizing information from multiple sources and converting it into actionable...
Noname API Security Platform
Executive View
Noname API Security Platform
The Noname API Security Platform is a unified API security solution that combines proactive API discovery and classification, runtime protection, and API security testing to ensure consistent...
Zero Trust Network Access
Leadership Compass
Zero Trust Network Access
This report is an overview of the market for Zero Trust Network Access (ZTNA) solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
Web Application Firewalls 2022
Leadership Compass
Web Application Firewalls 2022
This report provides an overview of the Web Application Firewall (WAF) market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market...
Cybersecurity for Industrial Control Systems
Market Compass
Cybersecurity for Industrial Control Systems
Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...
Policy Based Access Management
Market Compass
Policy Based Access Management
Access control is recognized as the most important component of an organization's cybersecurity protection. For too long access control has been based on static entitlements, but this is changing....
1 2 Next