Manage IT on the go with our incredibly effective mobile apps

Even an insignificant network issue can wreck havoc on your IT infrastructure when left unmanaged. This makes it vital that your IT team is alerted instantly whenever an issue arises, so they can troubleshoot it quickly, and ensure network stability.…
Continue reading Manage IT on the go with our incredibly effective mobile apps

German research organization bids adieu to multiple management platforms using OpManager

GFK is Germany’s largest market research institute and the fourth biggest market research organization in the world. It has a global digital presence in over 60 countries, with around 120 offices, and has been providing consumer and market insights for… Continue reading German research organization bids adieu to multiple management platforms using OpManager

Cybersecurity in the Summer of Uncertainty

What is the new normal for security professionals in the Summer of 2020? Hint: It involves protecting a larger attack surface than anyone…
The post Cybersecurity in the Summer of Uncertainty appeared first on Security Boulevard.
Continue reading Cybersecurity in the Summer of Uncertainty

New Video: Why is network data the best source for actionable data in cybersecurity?

In a recent blog post, our Head of Customer Success, Russell Gray, outlined the reasons why network data is the best source for actionable data in cybersecurity. He covered the limitations of each of the elements of a typical security stack (SIEM, Endp… Continue reading New Video: Why is network data the best source for actionable data in cybersecurity?

Network Data: The Best Source for Actionable Data in Cybersecurity

With the right tool, your network data can now provide you with most valuable, actionable alerts in your security stack. What follows is a discussion of some of the reasons why you may want to look to your network first when trying to identify potentia… Continue reading Network Data: The Best Source for Actionable Data in Cybersecurity

How to Use Your Baseline for Network Security

This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here:
1) An Introduction to Baselining Technology
2) How to Create a Baseline for Your Network
The post How to Use Your Baseline for Netwo… Continue reading How to Use Your Baseline for Network Security

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining technology.
The post An Introduction to Baselining Technology … Continue reading An Introduction to Baselining Technology

Gigamon Acquires ICEBRG to Meld Security, Network Monitoring

Gigamon announced it is expanding the scope of its cybersecurity monitoring efforts significantly by acquiring ICEBRG, a provider of a cloud-based threat detection service. The combination of the sensors ICEBRG deploys coupled with the real-time netwo… Continue reading Gigamon Acquires ICEBRG to Meld Security, Network Monitoring

Joe McManus, Automox – Enterprise Security Weekly #98

Joe McManus is an expert and industry advisor in the field of information security. He currently serves as the CISO of Automox, provider of cloud-based, cross-platform patching software. He is also a senior researcher at CERT, part of the Software Engi… Continue reading Joe McManus, Automox – Enterprise Security Weekly #98