Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Working from anywhere and the adoption of cloud services from multiple providers have become increasingly common in the post-pandemic era, but this has created new opportunities for cyber attackers...
Learn more
Blog
Blog
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
We already hear a lot about artificial intelligence (AI) systems being able to automate repetitive tasks. But AI is such a large term that encompasses many types of very different technologies....
Learn more
Buyer's Compass
Buyer's Compass
Security Operations Center as a Service (SOCaaS)
The Security Operations Center-as-a-Service (SOCaaS) market continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either...
Learn more
Webinar Recording
Webinar Recording
How to Hunt Threats Effectively With Network Detection & Response Solutions
The number of cyber-attacks globally continue to rise. Attacks are growing increasingly sophisticated. The tactics, techniques and procedures that were once only used by well-funded state actors...
Learn more
Adding Certainty to Your Cyber-Attack Detection Capabilities
Webinar Recording
Adding Certainty to Your Cyber-Attack Detection Capabilities
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to...
Analyst Chat #90: API Management and Security
Analyst Chat
Analyst Chat #90: API Management and Security
The market segment of products and services that are designed to manage and secure APIs as essential resources in a multitude of different environments is constantly evolving. On the occasion of...
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Frontier Talk
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Raj Hegde sits down with Peter Busch, DLT Product Owner at Bosch , to discuss how decentralization is enabling a wide range of exciting use cases across industries. Tune in to this episode to...
API Management and Security
Leadership Compass
API Management and Security
This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements...
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Blog
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Graham Williamson, Senior Analyst at KuppingerCole, is to deliver a presentation entitled Meeting Expectations – 5 pillars for IoT project success on Tuesday, September 14 starting at 7:20...
Analyst Chat #88: What (and why) is XDR?
Analyst Chat
Analyst Chat #88: What (and why) is XDR?
XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei...
What is XDR?
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
IT Security Transformation Can Come from Unexpected Places
Blog
IT Security Transformation Can Come from Unexpected Places
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the...
Analyst Chat #78: DNS and DNS Security
Analyst Chat
Analyst Chat #78: DNS and DNS Security
Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System....
Dark Side Ransomware Attacks
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Previous
2 3 4 5 6 7 8 Next