Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Working from anywhere and the adoption of cloud services from multiple providers have become increasingly common in the post-pandemic era, but this has created new opportunities for cyber attackers...
Learn more
Blog
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
Learn more
Market Compass
Market Compass
Cybersecurity for Industrial Control Systems
Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Learn more
Only Those Who Know the Dangers Can Protect Themselves
Event Recording
Only Those Who Know the Dangers Can Protect Themselves
How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers...
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Event Recording
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Cyber Security traditionally has been seen as the domain of Technology, with an expectation that the solution for cyber resilience has to be provided by IT – and we happily accepted this...
Rethinking Cybersecurity From the Human Element Point of View
Event Recording
Rethinking Cybersecurity From the Human Element Point of View
Over simplifying, IT security means defending the IT systems from threats procured by cybercriminals. Their targets are, for example, the manipulation of systems, the extorsion or exfiltration of...
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Event Recording
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Protecting Web Applications Amid Severe Staff Shortages
Webinar Recording
Protecting Web Applications Amid Severe Staff Shortages
Organizations are more dependent than ever on web applications for doing business with partners and customers, which means that protecting web applications has become business critical. But many...
Taking the Risk Out of Key Digital Business Enablers: APIs
Webinar Recording
Taking the Risk Out of Key Digital Business Enablers: APIs
Application Programming Interfaces (APIs) are among the foundations of modern digital business. APIs are found everywhere due to a rapid growth in demand to expose and consume APIs to enable new...
Analyst Chat #138: Jumpstart Your Zero Trust Strategy With Zero Trust Network Access (ZTNA) Solutions
Analyst Chat
Analyst Chat #138: Jumpstart Your Zero Trust Strategy With Zero Trust Network Access (ZTNA) Solutions
Zero Trust is rapidly gaining popularity as a modern alternative to traditional perimeter-based security. While it is (rightfully) mainly considered a concept rather than a product, a new market...
Analyst Chat #136: Why Securing Microservices Isn’t as Straightforward as You Might Think
Analyst Chat
Analyst Chat #136: Why Securing Microservices Isn’t as Straightforward as You Might Think
Microservices are increasingly becoming the new normal for enterprise architectures, no matter where they are deployed. Alexei Balaganski and Matthias discuss why doing this properly is essential...
Analyst Chat #133: Leadership Compass Web Application Firewalls
Analyst Chat
Analyst Chat #133: Leadership Compass Web Application Firewalls
Web Application Firewalls (WAF) have been around for quite some time to protect web applications through the inspection of HTTP traffic. But with a changing nature of web applications and the...
1 2 3 4 5 6 7 Next