Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
In an era where digital transformation is revolutionizing the way we do business, securing your organization's digital frontier is paramount. Threats are constantly evolving
Learn more
Blog
Blog
Compromise of IOTA
Turning a blind eye to security in favor of optimism If you have any take-away from reading KuppingerCole research , hopefully it is that APIs are a critical element to protect. This is true...
Learn more
Leadership Compass
Leadership Compass
API Security & Management
This Leadership Compass provides an overview of the market for API security and management solutions, along with recommendations and guidance for finding the products which address your...
Learn more
Webinar Recording
Webinar Recording
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log...
Learn more
Analyst Chat #90: API Management and Security
Analyst Chat
Analyst Chat #90: API Management and Security
The market segment of products and services that are designed to manage and secure APIs as essential resources in a multitude of different environments is constantly evolving. On the occasion of...
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Frontier Talk
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Raj Hegde sits down with Peter Busch, DLT Product Owner at Bosch , to discuss how decentralization is enabling a wide range of exciting use cases across industries. Tune in to this episode to...
API Management and Security
Leadership Compass
API Management and Security
This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements...
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Blog
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Graham Williamson, Senior Analyst at KuppingerCole, is to deliver a presentation entitled Meeting Expectations – 5 pillars for IoT project success on Tuesday, September 14 starting at 7:20...
Analyst Chat #88: What (and why) is XDR?
Analyst Chat
Analyst Chat #88: What (and why) is XDR?
XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei...
What is XDR?
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
IT Security Transformation Can Come from Unexpected Places
Blog
IT Security Transformation Can Come from Unexpected Places
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the...
Analyst Chat #78: DNS and DNS Security
Analyst Chat
Analyst Chat #78: DNS and DNS Security
Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System....
Dark Side Ransomware Attacks
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Are You Ready for Security Automation?
Webinar Recording
Are You Ready for Security Automation?
Security Orchestration, Automation & Response (SOAR) tools are the latest in the evolution of automated cyber defenses and are set to become the foundation of modern Security Operations...
When AI meets IoT: Does the Public Perception Reflect Reality?
Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we...
Network Detection & Response (NDR)
Buyer's Compass
Network Detection & Response (NDR)
Network Detection & Response (NDR) is the term for the tools that monitor networks for suspicious activities and threats and provide capabilities for alerting, intercepting, and preventing damage....
Previous
4 5 6 7 8 9 10 Next