Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Moving Towards AI and IoT Solutions Beyond Machine Learning
Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply...
Learn more
Executive View
Executive View
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique...
Learn more
Webinar Recording
Webinar Recording
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log...
Learn more
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
Blog
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
We already hear a lot about artificial intelligence (AI) systems being able to automate repetitive tasks. But AI is such a large term that encompasses many types of very different technologies....
API Platforms as the Secure Front Door to Your Identity Fabric
Blog
API Platforms as the Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate...
Palo Alto Networks Continues to Bet on Security-as-a-Service
Blog
Palo Alto Networks Continues to Bet on Security-as-a-Service
The market shift to cloud-based security services was highlighted at the Ignite Europe 2019 held by Palo Alto Networks in Barcelona, where the company announced a few product enhancements in an...
There Is No “One Stop Shop” for API Management and Security Yet
Blog
There Is No “One Stop Shop” for API Management and Security Yet
From what used to be a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital...
Nok Nok Labs Extends FIDO-Based Authentication
Blog
Nok Nok Labs Extends FIDO-Based Authentication
Nok Nok Labs has made FIDO certified multi-factor authentication – which seeks to eliminate dependence on password-based security - available across all digital channels by adding a...
Security Vendor Imperva Reports a Breach
Blog
Security Vendor Imperva Reports a Breach
Imperva , a US-based cybersecurity company known for its web application security and data protection products, has disclosed a breach of their customer data. According to the announcement , a...
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
Blog
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
Security has seldom been the focus of device manufacturers who have historically taken their own approach for securing the devices in the IoT. Most devices in enterprise, consumer or industrial...
API Security in Microservices Architectures
Blog
API Security in Microservices Architectures
Microservice-based architectures allow businesses to develop and deploy their applications in a much more flexible, scalable and convenient way – across multiple programming languages,...
Robotic Process Automation – an IAM Challenge
Blog
Robotic Process Automation – an IAM Challenge
Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform...
IAM for a Microservices World: Securing Agile IT
Blog
IAM for a Microservices World: Securing Agile IT
Ten years ago, for the second EIC, we published a report and survey on the intersection of IAM and SOA (in German language). The main finding back then was that most businesses don’t...
EBA Rules out Secure Open Banking?
Blog
EBA Rules out Secure Open Banking?
On January 30th in London I attended a joint workshop between OpenID and the UK Open Banking community that was facilitated by Don Thibeau of OIX. This workshop included an update from Mike Jones...
IBM Moves Security to the Next Level – on the Mainframe
Blog
IBM Moves Security to the Next Level – on the Mainframe
In a recent press release , IBM announced that they are moving security to a new level, with “pervasively encrypted data, all the time at any scale”. That sounded cool and, after...