Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past...
Learn more
Whitepaper
Whitepaper
How to Do Identity Right When Developing Digital Services
In the digital age, digital experience heavily impacts the success of businesses. A main element of digital experience is the registration, authentication and authorization flow. Instead of...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Learn more
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Microservices in Identity and Access Management
Video
Microservices in Identity and Access Management
Analyst Chat #9: The Dark Side of the API Economy
Analyst Chat
Analyst Chat #9: The Dark Side of the API Economy
Matthias Reinwarth and Alexei Balaganski discuss the challenges of explosive API growth without proper security controls in place.
API Management and Security: Don’t Trade Protection for Convenience
Webinar Recording
API Management and Security: Don’t Trade Protection for Convenience
Once a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. As...
How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”
Webinar Recording
How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a...
The Dark Side of the API Economy
Webinar Recording
The Dark Side of the API Economy
In a single decade, Application Programming Interfaces (APIs) have evolved from a purely technical concept into one of the foundations of modern digital business, delivering operational...
API Security: Separating Truth from Fiction
Webinar Recording
API Security: Separating Truth from Fiction
APIs (application programming interfaces) have undergone a truly amazing transformation in recent years. From an obscure technical term only software developers were familiar with, they have...
IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly
Webinar Recording
IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly
Making your service available to everyone, everywhere, without losing control. On their digital journey, businesses are constantly launching new digital services, chased by competitive and...
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
Webinar Recording
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops...
Andre Priebe - CIAM & API Management
Event Recording
Andre Priebe - CIAM & API Management
Customer Identity & Access Management und API Management sind als Business Enabler bekannt. Aber in Kombination sind sie sogar mehr als die Summe ihrer Teile.  Erfahren Sie, wie...
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Webinar Recording
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services...
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Webinar Recording
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Banks will soon have to comply with the Revised Payment Service Directive, commonly called "PSD2." The directive will introduce massive changes to the payments industry and radically alter the...
Previous
2 3 4 5 6 7 8 Next