Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Standfirst: Identity Management plays a crucial role in addressing IoT, IIoT, and IoMT challenges. Avoid the pitfalls by following some key security best practices.
Learn more
Executive View
Executive View
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique...
Learn more
Webinar Recording
Webinar Recording
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
Join security experts from KuppingerCole Analysts and Palo Alto Networks for an insightful and engaging webinar as they delve into the dynamic world of attack surface and threat management. They...
Learn more
Drs. Jacoba C. Sieders - Digital Identities and Blockchain: Experiments and Use Cases @ ABNAMRO
Event Recording
Drs. Jacoba C. Sieders - Digital Identities and Blockchain: Experiments and Use Cases @ ABNAMRO
ABNAMRO runs over 30 blockchain experiments, also involving digital identity capabilities. Co-operation has been set –up across various coalitions, and use cases are running a lot wider than...
Kim Cameron - The Laws of Identity on the Blockchain
Event Recording
Kim Cameron - The Laws of Identity on the Blockchain
Keynote at the European Identity & Cloud Conference 2018
Dr. Sridhar Muppidi - Identity Meets Fraud Protection to Establish Digital Trust
Event Recording
Dr. Sridhar Muppidi - Identity Meets Fraud Protection to Establish Digital Trust
In this session, we will introduce a framework to establish digital trust based on capabilities from fraud protection and Identity. This will quickly and transparently establish a trusted,...
Patrick Parker - The AI and Robotic Process Automation Revolution and the Upcoming Redesign of IAM
Event Recording
Patrick Parker - The AI and Robotic Process Automation Revolution and the Upcoming Redesign of IAM
The AI and Robotic Process Automation revolutions are in full swing with record growth in both sectors as well as an explosion of new startups in this space. Not to be left behind, existing...
Jason Rose - Realizing the full potential of Consumer Identity
Event Recording
Jason Rose - Realizing the full potential of Consumer Identity
Customer Experience is Everything and Everything is Digital. Digital transformation is now the center of marketing, advertising and sales strategy across every industry and region, with...
Jackson Shaw - Fire Safety and Cyber-Security – Smoke Detectors are Not Enough
Event Recording
Jackson Shaw - Fire Safety and Cyber-Security – Smoke Detectors are Not Enough
It takes most businesses over 6 months to detect a breach on their network. And while smoke detectors are proven to halve the death rate by fire, saving thousands of lives each year, detection is...
Eve Maler - The Evolution of Identity and its Importance for our Digital Lives
Event Recording
Eve Maler - The Evolution of Identity and its Importance for our Digital Lives
Identity is as old as mankind and adapted very well to its changing environments. From a simple look that determines who you are to a high frequency of multi-factor vehicle-to-vehicle...
Carmine Auletta - Identity & Digital Trust
Event Recording
Carmine Auletta - Identity & Digital Trust
Trust is essential for a society to function. It’s even more critical in a digital society where transactions take place between parties that can only rely on each other supplied digital...
Lukas Praml - Your Mobile Identity: Blockchain Ain't no Swiss Army Knife
Event Recording
Lukas Praml - Your Mobile Identity: Blockchain Ain't no Swiss Army Knife
Digital identity solutions are very wide spread and everybody is using them on a day to day basis. Mainly it can be distinguished between state issued IDs/eIDs which lack usability and are...
Christopher Spanton - Blockchain and the Business of Identity
Event Recording
Christopher Spanton - Blockchain and the Business of Identity
Identity and Access Management (IAM) within an enterprise environment presents complex challenges for any business. While new technologies, such as blockchain, have the potential to help solve...
Mo Ahddoud - SGN Securing Shared Credentials at The Heart of Digital Transformation
Event Recording
Mo Ahddoud - SGN Securing Shared Credentials at The Heart of Digital Transformation
The future of IT security will depend on CISOs who are brave enough to build a new security model that is both innovative and unconventional. Gas distribution company, SGN, is blazing a trail that...
Connected Car: Putting Digital Identity Behind the Wheel
Webinar Recording
Connected Car: Putting Digital Identity Behind the Wheel
A modern connected vehicle is no longer just a car with a built-in wireless access point – it is a complex network of multiple interconnected systems from different vendors that are...
Previous
4 5 6 7 8 9 10 Next