Justin Jett

What is Deep Network Observability?

Network Observability is the ability to collect, analyze, and activate network data. With network observability, you can easily answer questions about your network. Deep Network Observability takes it a step further by extracting data from other sources interacting with your network to provide actionable insight from your entire IT environment. To use a metaphor, Deep …

What is Deep Network Observability? Read More »

padlock securing a door

The importance of encrypted traffic analytics to your network security posture

Data security is a critical aspect of any organization’s IT infrastructure. With the explosion of cyber threats, it has become ever-important to ensure that your network is protected. While there are many ways to protect your network, having information related to encrypted network traffic is one of the most effective ways to achieve this goal. …

The importance of encrypted traffic analytics to your network security posture Read More »

Night Sky

3 Factors When Considering a Network Detection and Response Platform

It’s a cliche at this point to discuss the “ever-evolving threat landscape”. Cliché or not, the fact remains that attackers continue to become more sophisticated. Today’s threats show that legacy detection is insufficient, and behavior-based detection is critical. A Network Detection and Response (NDR) platform is a key component of a comprehensive security strategy, providing …

3 Factors When Considering a Network Detection and Response Platform Read More »

View of space beyond treelined

3 cybersecurity trends you should pay attention to

How prepared for an attack are you? The most recent Microsoft Defence Report found volume of password attacks has risen to an estimated 921 attacks every second. The rise of cyber attacks and data breaches has made it imperative for organizations to invest in robust cybersecurity measures. The threat landscape is rapidly evolving, and organizations …

3 cybersecurity trends you should pay attention to Read More »

Preparing for the next threat

It’s safe to say organizations have had their fair share of cyber attacks this past year—from threats discovered early last year with VMware (CVE-2021-21985 and CVE-2021-21972), which provided access to compromised environments and sensitive data, to the Apache Log4j vulnerability, which sent IT professionals scrambling to patch every system that might have a vulnerable release installed. These incidents don’t even …

Preparing for the next threat Read More »

When EDR isn’t enough, be glad you have NDR

When tools that were created to help security teams simulate attacks are used by the attackers, you know there’s a problem. But that’s exactly what’s happened in recent news where the Brute Ratel C4 (BRc4) red-teaming and adversarial attack simulation tool was used by nation-state attackers to evade detection. 

The importance of network device discovery

Market research consulting firm Frost & Sullivan’s recent analysis found that enterprises were becoming more vulnerable to cyberattacks due to an expanded attack surface increase by “multiple touchpoints through an open network and easy accessibility to database[s] and applications.” As users join and leave the network from myriad devices, organizations need a way to improve their security …

The importance of network device discovery Read More »