Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Working from anywhere and the adoption of cloud services from multiple providers have become increasingly common in the post-pandemic era, but this has created new opportunities for cyber attackers...
Learn more
Blog
Blog
IT Security Transformation Can Come from Unexpected Places
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the...
Learn more
Leadership Brief
Leadership Brief
Machine Customers - The Impact of Consumer Bots on Customer Journeys
Machine customers are already present in many markets, driven by trends such as IoT. This leadership brief gives an overview on how to prepare to satisfy the needs of consumer bots and other...
Learn more
Webinar Recording
Webinar Recording
How to Hunt Threats Effectively With Network Detection & Response Solutions
The number of cyber-attacks globally continue to rise. Attacks are growing increasingly sophisticated. The tactics, techniques and procedures that were once only used by well-funded state actors...
Learn more
Are You Ready for Security Automation?
Webinar Recording
Are You Ready for Security Automation?
Security Orchestration, Automation & Response (SOAR) tools are the latest in the evolution of automated cyber defenses and are set to become the foundation of modern Security Operations...
When AI meets IoT: Does the Public Perception Reflect Reality?
Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we...
Network Detection & Response (NDR)
Buyer's Compass
Network Detection & Response (NDR)
Network Detection & Response (NDR) is the term for the tools that monitor networks for suspicious activities and threats and provide capabilities for alerting, intercepting, and preventing damage....
Attack Surface Reduction and XDR
Blog
Attack Surface Reduction and XDR
Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing...
How to Hunt Threats Effectively With Network Detection & Response Solutions
Webinar Recording
How to Hunt Threats Effectively With Network Detection & Response Solutions
The number of cyber-attacks globally continue to rise. Attacks are growing increasingly sophisticated. The tactics, techniques and procedures that were once only used by well-funded state actors...
Analyst Chat #27: NDR - Network (Threat) Detection and Response
Analyst Chat
Analyst Chat #27: NDR - Network (Threat) Detection and Response
John Tolbert and Matthias Reinwarth talk about network detection and response solutions: what are the threats they are looking for and how they complement endpoint protection tools to ensure...
Analyst Chat #18: Zero Trust from the Cloud
Analyst Chat
Analyst Chat #18: Zero Trust from the Cloud
Matthias Reinwarth and Alexei Balaganski look at the potential alternatives to VPNs and security gateways.
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Microservices in Identity and Access Management
Blog
Microservices in Identity and Access Management
Microservices in Identity and Access Management
Video
Microservices in Identity and Access Management
Previous
3 4 5 6 7 8 9 Next