Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Mastering CIAM: Advanced Techniques for Designing a Resilient CIAM Program
In today's digital landscape, mastering CIAM is crucial for IT professionals. Challenges like imperfect client touchpoints, high abandonment rates, and limited system insights hinder best...
Learn more
Blog
Blog
NIS2 Directive: Who, What, and How?
In the wake of increased cyber-attacks on national critical infrastructure, authorities around the world are imposing stricter requirements on organizations that their populations rely on for a...
Learn more
Leadership Compass
Leadership Compass
Network Detection & Response (NDR)
This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your needs. We examine...
Learn more
Event Recording
Event Recording
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Autonomous networking aims at the appropriate handling of the growing number of devices, machine, sensors and components for which authentication and authorization must be ensured, i.e.,...
Learn more
What is XDR?
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
IT Security Transformation Can Come from Unexpected Places
Blog
IT Security Transformation Can Come from Unexpected Places
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the...
Analyst Chat #78: DNS and DNS Security
Analyst Chat
Analyst Chat #78: DNS and DNS Security
Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System....
Dark Side Ransomware Attacks
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Are You Ready for Security Automation?
Webinar Recording
Are You Ready for Security Automation?
Security Orchestration, Automation & Response (SOAR) tools are the latest in the evolution of automated cyber defenses and are set to become the foundation of modern Security Operations...
When AI meets IoT: Does the Public Perception Reflect Reality?
Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we...
Network Detection & Response (NDR)
Buyer's Compass
Network Detection & Response (NDR)
Network Detection & Response (NDR) is the term for the tools that monitor networks for suspicious activities and threats and provide capabilities for alerting, intercepting, and preventing damage....
Attack Surface Reduction and XDR
Blog
Attack Surface Reduction and XDR
Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing...
How to Hunt Threats Effectively With Network Detection & Response Solutions
Webinar Recording
How to Hunt Threats Effectively With Network Detection & Response Solutions
The number of cyber-attacks globally continue to rise. Attacks are growing increasingly sophisticated. The tactics, techniques and procedures that were once only used by well-funded state actors...
Analyst Chat #27: NDR - Network (Threat) Detection and Response
Analyst Chat
Analyst Chat #27: NDR - Network (Threat) Detection and Response
John Tolbert and Matthias Reinwarth talk about network detection and response solutions: what are the threats they are looking for and how they complement endpoint protection tools to ensure...
Analyst Chat #18: Zero Trust from the Cloud
Analyst Chat
Analyst Chat #18: Zero Trust from the Cloud
Matthias Reinwarth and Alexei Balaganski look at the potential alternatives to VPNs and security gateways.
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Previous
5 6 7 8 9 10 11 Next