Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution
Join the biggest international cybersecurity conference in Germany and meet 500 security practitioners. Participate in four interactive tracks to get insights on Quantum Computing, Supply Chain...
Learn more
Blog
Blog
Microservices in Identity and Access Management
Learn more
Executive View
Executive View
Akana by Perforce
Akana API Platform is a fully integrated API management, transformation, and security platform that can address a multitude of enterprise use cases from API design and development to business...
Learn more
Webinar Recording
Webinar Recording
API Management and Security: Don’t Trade Protection for Convenience
Once a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. As...
Learn more
What is XDR?
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
IT Security Transformation Can Come from Unexpected Places
Blog
IT Security Transformation Can Come from Unexpected Places
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the...
Analyst Chat #78: DNS and DNS Security
Analyst Chat
Analyst Chat #78: DNS and DNS Security
Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System....
Dark Side Ransomware Attacks
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Are You Ready for Security Automation?
Webinar Recording
Are You Ready for Security Automation?
Security Orchestration, Automation & Response (SOAR) tools are the latest in the evolution of automated cyber defenses and are set to become the foundation of modern Security Operations...
When AI meets IoT: Does the Public Perception Reflect Reality?
Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we...
Network Detection & Response (NDR)
Buyer's Compass
Network Detection & Response (NDR)
Network Detection & Response (NDR) is the term for the tools that monitor networks for suspicious activities and threats and provide capabilities for alerting, intercepting, and preventing damage....
Attack Surface Reduction and XDR
Blog
Attack Surface Reduction and XDR
Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing...
How to Hunt Threats Effectively With Network Detection & Response Solutions
Webinar Recording
How to Hunt Threats Effectively With Network Detection & Response Solutions
The number of cyber-attacks globally continue to rise. Attacks are growing increasingly sophisticated. The tactics, techniques and procedures that were once only used by well-funded state actors...
Analyst Chat #27: NDR - Network (Threat) Detection and Response
Analyst Chat
Analyst Chat #27: NDR - Network (Threat) Detection and Response
John Tolbert and Matthias Reinwarth talk about network detection and response solutions: what are the threats they are looking for and how they complement endpoint protection tools to ensure...
Previous
3 4 5 6 7 8 9 Next