Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Business-Critical Web Application Firewalls
Organizations are more dependent than ever on web applications for doing business with partners and customers, which means that protecting web applications has become business critical, something...
Learn more
Executive View
Executive View
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique...
Learn more
Event Recording
Event Recording
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Identity Governance and Administration (IGA) is critical for ensuring the security of an organization, but it can also be a complex and time-consuming process. Join us for an engaging conversation...
Learn more
Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices
Webinar Recording
Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices
As opposed to traditional monolithic applications, a (micro)service-based architecture comprises multiple loosely coupled modules (“services”) that serve specific business purposes and...
The Crucial Role of Identity in Securing Industrial IoT
Webinar Recording
The Crucial Role of Identity in Securing Industrial IoT
As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our...
How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation
Webinar Recording
How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation
The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels....
Denis Joannides - Empowering the Digital Insurers
Event Recording
Denis Joannides - Empowering the Digital Insurers
In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to...
Architecting a Digital Strategy for PSD2 and Open Banking
Webinar Recording
Architecting a Digital Strategy for PSD2 and Open Banking
PSD2 and the Open Banking Standard are regulatory mandates being applied to the banking industry by the European Banking Authority (EBA) and Competition & Markets Authority (CMA) across Europe...
Dimitra Kamarinou - From Suppliers to Consumers: Issues of Liability in Industry 4.0
Event Recording
Dimitra Kamarinou - From Suppliers to Consumers: Issues of Liability in Industry 4.0
This session looks at the responsibilities and liabilities of organisations involved in the ‘smart manufacturing’ process both internally (e.g. towards employees) and externally (e.g....
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
Event Recording
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have...
Jackson Shaw - The Internet of Things One Year Later
Event Recording
Jackson Shaw - The Internet of Things One Year Later
Last year we had our first discussion of risk and value related to IoT. Over the last 12 months we have gone from “What is this IoT?” to IoT becoming a driver of digital...
Forget Firewalls - Enterprise Data is your New Perimeter
Webinar Recording
Forget Firewalls - Enterprise Data is your New Perimeter
One of the biggest challenges modern enterprises are facing is the evolution toward connected businesses. To survive in this fiercely competitive environment, businesses strive to be as agile as...
One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation
Webinar Recording
One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation
A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile...
How to Cope with Challenging Identities in a Converged World
Webinar Recording
How to Cope with Challenging Identities in a Converged World
Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business,...
David Mount - A smarter, More Secure Internet of Things?
Event Recording
David Mount - A smarter, More Secure Internet of Things?
We are standing on the very brink of the most fundamental change in the way human beings use technology since the introduction of agriculture, over 6 thousand years ago. The Internet of Things...
Previous
4 5 6 7 8 9 10 Next