Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Ambient Intelligence Can’t Mature Without an Identity Protocol
Every day we are experiencing the intersection of IoT and AI. The interactions of users, sensors, robots, vehicles, smart buildings, and much more is creating a new status quo for digital...
Learn more
Executive View
Executive View
Akana by Perforce
Akana API Platform is a fully integrated API management, transformation, and security platform that can address a multitude of enterprise use cases from API design and development to business...
Learn more
Event Recording
Event Recording
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Identity Governance and Administration (IGA) is critical for ensuring the security of an organization, but it can also be a complex and time-consuming process. Join us for an engaging conversation...
Learn more
What is XDR?
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
IT Security Transformation Can Come from Unexpected Places
Blog
IT Security Transformation Can Come from Unexpected Places
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the...
Analyst Chat #78: DNS and DNS Security
Analyst Chat
Analyst Chat #78: DNS and DNS Security
Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System....
Dark Side Ransomware Attacks
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Are You Ready for Security Automation?
Webinar Recording
Are You Ready for Security Automation?
Security Orchestration, Automation & Response (SOAR) tools are the latest in the evolution of automated cyber defenses and are set to become the foundation of modern Security Operations...
When AI meets IoT: Does the Public Perception Reflect Reality?
Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we...
Network Detection & Response (NDR)
Buyer's Compass
Network Detection & Response (NDR)
Network Detection & Response (NDR) is the term for the tools that monitor networks for suspicious activities and threats and provide capabilities for alerting, intercepting, and preventing damage....
Attack Surface Reduction and XDR
Blog
Attack Surface Reduction and XDR
Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing...
How to Hunt Threats Effectively With Network Detection & Response Solutions
Webinar Recording
How to Hunt Threats Effectively With Network Detection & Response Solutions
The number of cyber-attacks globally continue to rise. Attacks are growing increasingly sophisticated. The tactics, techniques and procedures that were once only used by well-funded state actors...
Analyst Chat #27: NDR - Network (Threat) Detection and Response
Analyst Chat
Analyst Chat #27: NDR - Network (Threat) Detection and Response
John Tolbert and Matthias Reinwarth talk about network detection and response solutions: what are the threats they are looking for and how they complement endpoint protection tools to ensure...
Analyst Chat #18: Zero Trust from the Cloud
Analyst Chat
Analyst Chat #18: Zero Trust from the Cloud
Matthias Reinwarth and Alexei Balaganski look at the potential alternatives to VPNs and security gateways.
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Previous
5 6 7 8 9 10 11 Next