Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Mastering CIAM: Advanced Techniques for Designing a Resilient CIAM Program
In today's digital landscape, mastering CIAM is crucial for IT professionals. Challenges like imperfect client touchpoints, high abandonment rates, and limited system insights hinder best...
Learn more
Blog
Blog
Here’s Why DDoS Attacks Have Become a Bigger Threat
DDoS (Distributed Denial of Service) attacks are no longer top of mind; however, today DDoS attacks are an even bigger threat than ever before. The pandemic has accelerated digital...
Learn more
Executive View
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the...
Learn more
Event Recording
Event Recording
Moving on from legacy MFA: Phishing-resistant MFA as a prerequisite for Passwordless
As long as passwords exist, enterprises are vulnerable to account takeover attacks –yet organizations looking to eliminate passwords may not know where to begin their passwordless journey....
Learn more
Microservices in Identity and Access Management
Blog
Microservices in Identity and Access Management
Microservices in Identity and Access Management
Video
Microservices in Identity and Access Management
Analyst Chat #9: The Dark Side of the API Economy
Analyst Chat
Analyst Chat #9: The Dark Side of the API Economy
Matthias Reinwarth and Alexei Balaganski discuss the challenges of explosive API growth without proper security controls in place.
Malicious Actors Exploiting Coronavirus Fears
Blog
Malicious Actors Exploiting Coronavirus Fears
Security researchers are discovering a number of malicious attacks designed to exploit public fears around COVID-19, more commonly just called coronavirus. The attacks to date take two major...
Compromise of IOTA
Blog
Compromise of IOTA
Turning a blind eye to security in favor of optimism If you have any take-away from reading KuppingerCole research , hopefully it is that APIs are a critical element to protect. This is true...
Ambient Intelligence Can’t Mature Without an Identity Protocol
Blog
Ambient Intelligence Can’t Mature Without an Identity Protocol
Every day we are experiencing the intersection of IoT and AI. The interactions of users, sensors, robots, vehicles, smart buildings, and much more is creating a new status quo for digital...
Moving Towards AI and IoT Solutions Beyond Machine Learning
Blog
Moving Towards AI and IoT Solutions Beyond Machine Learning
Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply...
API Management and Security: Don’t Trade Protection for Convenience
Webinar Recording
API Management and Security: Don’t Trade Protection for Convenience
Once a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. As...
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
Blog
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
We already hear a lot about artificial intelligence (AI) systems being able to automate repetitive tasks. But AI is such a large term that encompasses many types of very different technologies....
API Platforms as the Secure Front Door to Your Identity Fabric
Blog
API Platforms as the Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate...
Palo Alto Networks Continues to Bet on Security-as-a-Service
Blog
Palo Alto Networks Continues to Bet on Security-as-a-Service
The market shift to cloud-based security services was highlighted at the Ignite Europe 2019 held by Palo Alto Networks in Barcelona, where the company announced a few product enhancements in an...
There Is No “One Stop Shop” for API Management and Security Yet
Blog
There Is No “One Stop Shop” for API Management and Security Yet
From what used to be a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital...
Previous
6 7 8 9 10 11 12 Next