Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Learn more
Market Compass
Market Compass
Policy Based Access Management
Access control is recognized as the most important component of an organization's cybersecurity protection. For too long access control has been based on static entitlements, but this is changing....
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #138: Jumpstart Your Zero Trust Strategy With Zero Trust Network Access (ZTNA) Solutions
Zero Trust is rapidly gaining popularity as a modern alternative to traditional perimeter-based security. While it is (rightfully) mainly considered a concept rather than a product, a new market...
Learn more
SentinelOne Acquires Attivo Networks: A Big Leap Forward to Security With Identity
Blog
SentinelOne Acquires Attivo Networks: A Big Leap Forward to Security With Identity
SentinelOne has announced that they will acquire Attivo Networks, a leading Distributed Deception Platform (DDP) and Identity Threat Detection & Response (ITDR) solution provider. This is a good...
Network Detection and Response
Blog
Network Detection and Response
Chief information Security Officers agree that their organizations are under attack from a greater volume of cyber-attacks than ever before. The almost daily reports of security breaches by cyber...
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Blog
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Graham Williamson, Senior Analyst at KuppingerCole, is to deliver a presentation entitled Meeting Expectations – 5 pillars for IoT project success on Tuesday, September 14 starting at 7:20...
What is XDR?
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
IT Security Transformation Can Come from Unexpected Places
Blog
IT Security Transformation Can Come from Unexpected Places
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the...
Dark Side Ransomware Attacks
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Attack Surface Reduction and XDR
Blog
Attack Surface Reduction and XDR
Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing...
Microservices in Identity and Access Management
Blog
Microservices in Identity and Access Management
Malicious Actors Exploiting Coronavirus Fears
Blog
Malicious Actors Exploiting Coronavirus Fears
Security researchers are discovering a number of malicious attacks designed to exploit public fears around COVID-19, more commonly just called coronavirus. The attacks to date take two major...
Compromise of IOTA
Blog
Compromise of IOTA
Turning a blind eye to security in favor of optimism If you have any take-away from reading KuppingerCole research , hopefully it is that APIs are a critical element to protect. This is true...
Ambient Intelligence Can’t Mature Without an Identity Protocol
Blog
Ambient Intelligence Can’t Mature Without an Identity Protocol
Every day we are experiencing the intersection of IoT and AI. The interactions of users, sensors, robots, vehicles, smart buildings, and much more is creating a new status quo for digital...
Moving Towards AI and IoT Solutions Beyond Machine Learning
Blog
Moving Towards AI and IoT Solutions Beyond Machine Learning
Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply...