Mining for Gold: Flow Logs as a Security Resource
The big opportunity you have as a startup is to change the way that people think and solve really hard problems. It’s an exciting challenge and what’s driven me throughout my career.
Read More
Azure VNet Flow Log Support Simplifies Detection of East/West Movement
Netography Fusion recently added support for Microsoft Azure Virtual Network (VNet) flow logs, a new feature in Azure Network Watcher, making it easier for you to use Fusion to detect anomalous activity like East/West movement…
Read More
Mitigating M&A Cybersecurity Risk with Netography Fusion
During my career in security and network operations, I’ve had the opportunity to be part of the due diligence process in several mergers and acquisitions. Now, as a sales engineer at Netography, I am working…
Read More
Sleep More, Worry Less with Automated Detection and Monitoring of New VNets and VPCs
“The scariest thing in the world is a developer with a credit card” -CISO, F500 FinTech. VPCs and VNets spinning up without the knowledge of SecOps, NetOps, or CloudOps teams can give CISOs nightmares. All…
Read More
More Signal, Fewer Resources: The Value of Context-Enriched Metadata
Security organizations have long faced challenges with deployment of security infrastructure that provides detection of attacks and attackers when performing initial configuration, tuning, and ongoing curation. It is resource-intensive to get a toolset to productivity,…
Read More
The Eureka Moment: Discovering Application Traffic Observability
If you’ve been part of a network segmentation or Zero Trust architecture planning project or a data center or application migration initiative, the following scenario probably rings true.
Read More
The Forgotten Need for Network Observability in the Rush to Migrate to the Cloud
As enterprises embrace a multi-cloud strategy, the top use case is apps siloed on different clouds which increased to 57%, up from 44% last year. So, when it comes to cloud security, it makes sense…
Read More
Detecting Attacks Against Kerberos with Network Metadata
Netography recently released a new collection of capabilities for detecting attacks on the Kerberos protocol that are often launched against Windows domains during network intrusions. Some of these attacks are difficult to detect with log…
Read More
Why Every Multi-Cloud Environment Needs an Application Owner Dashboard
Organizations have moved to multi-cloud environments to achieve the benefits of business resilience, agility, best-of-breed capabilities, compliance, and cost containment, or due to the result of a merger or acquisition. But distributed environments also introduce…
Read More
Netography Releases Detection Models for Activity Targeting Rockwell Automation ICS Devices
Last week, Rockwell Automation issued an urgent message to customers urging them to “take immediate action” to disconnect any Rockwell ICS devices exposed to the internet. Rockwell issued this notice due to “heightened geopolitical tensions…
Read More
Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion
The concept of a Zero Trust Architecture (ZTA) is pretty simple – trust no one, verify everyone. No user or device should be trusted automatically, even if they are connected to a permissioned environment or…
Read More
“You Can’t Protect What You Can’t See” Still Rings True. Why Observability Now.
Remember the old saying: “You can’t protect what you can’t see”? When I started preaching about it as part of the marketing launch for Real-time Network Awareness (RNA) it seemed pretty obvious that we needed…
Read More
Yellowstone Ranch 2.0: Protecting Your Multi-cloud and Hybrid “Herd” with Trust Boundaries
Like many of you, I’ve been sucked into the Yellowstone series. Having grown up and lived my entire life in a congested corner of Massachusetts, the series may as well have taken place on the…
Read More
How to Close the Visibility Gaps Across Your Multi-Cloud Environment
Nearly 90% of organizations have a multi-cloud environment today. However, those environments create operational challenges for teams that are responsible for ensuring availability and maintaining compliance with policies. Too often operations teams lack the oversight…
Read More
Getting to High-Fidelity Detections Faster with Context Creation Models
In this new blog, James Pittman describes how dynamic context creation models in Netograpy Fusion use attributes from your tech stack to generate high fidelity detections that reduce alert overload.
Read More
The Need for East-West Observability to Protect Against Compromised IAM
In his new blog, Martin Roesch describes how leveraging an immutable source of truth you can trust – your network – provides East-West observability to get ahead of attackers when your IAM has been subverted…
Read More
The SOC 2 Effect: Elevating Security and Trust in Netography Fusion
An insider’s view of some important lessons learned during Netography’s journey to achieve SOC 2 compliance and its benefits to our customers.
Read More
Don’t Misdefine Network Security in 2024: Include On-Prem and Cloud
Cloud networks contain valuable security information, but without a way to gather and analyze that data, you are missing out on a comprehensive view of what’s happening and what should never occur.
Read More
A CISO Explains: How Netography Defends Critical Infrastructure
Read the recap of our online discussion with Jason Waits, CISO at Inductive Automation. He explains how his security team used the Netography Fusion® Network Defense Platform (NDP) to advance his network defenses beyond traditional…
Read More
Netography Fusion Expands Microsoft Integrations for Greater Context Enrichment and Faster Compromise Detection
Netography Fusion adds Microsoft Defender for Endpoint and Microsoft Defender XDR integrations, enabling customers with faster detection of and response to compromises with context from Microsoft-managed identities, email, endpoints, and cloud apps.
Read More
Why It’s Time to Evolve from Threat-centric to Compromise-centric Security
In his new blog, Martin Roesch explains why we all need to change our focus when we think about detections, and evolve from threat-centric to compromise-centric approaches.
Read More
The One-Two Punch of Frictionless Network Defense
This blog by Martin Roesch explains how Netography’s new approach of a frictionless network defense strategy was built on the concepts of frictionless deployment with no appliances, sensors, or agents, and our ecosystem of third-party…
Read More
Recipe for an Actionable Alert
In this new blog by By Dan Ramaswami he gives his recipe for an actionable alert using Netography to combine the ingredients of data and context from host, user, application, and governance and compliance information…
Read More
Netography Releases Detection for Actively Exploited DoS Amplification CVE-2023-29552
To respond to this threat, Netography has released a new Netography Detection Model (NDM), called “slpreflection”, which will detect floods of traffic originating from the SLP port (427).
Read More
Insights from Security Mavericks: Interpublic Group, FICO, and Mercury
Our webinar “Security Mavericks: Interpublic Group, FICO, and Mercury” is available to watch on-demand or read the recap, where Troy Wilkinson, Interpublic Group, Shannon Ryan, FICO, and Branden Wagner, Mercury, talked about the surprises and…
Read More
Managing the Chaos with Context
Event sources continue to grow, creating alert fatigue from all the noise that security teams have to analyze to determine if there is a compromise, and context is needed to manage this chaos.
Read More
Netography Fusion Detects Post-Compromise Behavior from Critical Cisco Zero-Day Vulnerability
Active exploitation of this vulnerability installs a malware implant on affected devices allowing attackers to execute arbitrary commands with full privileges. Unlike single-event-based detections, Netography detection models only trigger after observing follow-on exploitation behavior of…
Read More
Useful, Challenging, Ineffectual: Three Ways to Look at DPI
Martin Roesch explains the situations where DPI is still useful, where it is costly, and where it is ineffective, and how Netography Fusion works as a 100% SaaS platform with DPI to achieve more effective…
Read More
Context-Enriched Metadata Reduces Your Teams’ Workloads
The ability to enrich metadata with attributes from applications and services in your tech stack significantly reduces the time your SecOps, NetOps, and CloudOps teams.
Read More
Launching Tomorrow: CyberPsych Podcast with Dr. Stacy Thayer
We are very excited to announce the launch of our new podcast, CyberPsych. In an era where the digital landscape is continuously evolving and cybersecurity concerns are at an all-time high, CyberPsych aims to shed…
Read More
Jeff Nathan: Build Discipline into Threat Research for Detection Engineering that Benefits Customers
We are excited to have Jeff Nathan as our Director of Detection Engineering. His experience applying discipline to threat research to solve complex problems, and his passion for building “always-learning” teams, are a great win…
Read More
The Enterprise Market Shift to Network Defense Platform
Martin Roesch discusses how Netography pioneered the creation of a Network Defense Platform (NDP) as a way to address these changes and created a new approach to network monitoring and security, bringing everything from your…
Read More
Contextual Awareness in Network Detections
In his new blog, Mal Fitzgerald talks about how Netography applies contextual awareness to address custom network challenges and security concerns.
Read More
The Evolution of NDP: Finding Our Fit in the Technological Landscape
Co-founder and chief architect of Netography Barrett Lyon knew security technology would need to evolve as networks became more atomized. His new blog discusses his and Dan Murphy’s journey to build the NDP category for…
Read More
The Travel Bug: NetSec Edition
As a network admin, Mal Fitzgerald used tools for network monitoring, but all had the glaring weakness of blind spots. His new blog discusses how Netography lets network security engineers monitor their entire network from…
Read More
NIST + Govern = A Welcome Addition
Governance is one of the key use cases that our customers demand from Netography Fusion, which puts us well in step with NIST’s recent announcement to add Govern as a core function of its Cybersecurity…
Read More
The Time for Netography Fusion Is Now
The time is now for Netography Fusion to break through the barriers and provide real-time, end-to-end visibility to help reduce atomization – of networks and organizations.
Read More
Network Defense Platform: The Evolution Needed for Modern Enterprise Security
Network Defense Platforms give comprehensive real-time visibility of cloud and on-prem traffic to validate governance, and monitor, detect, and respond to compromises
Read More
Netography: Getting Beyond the ‘Black Box’ Approach to DDoS
Netography helps organizations understand emergent attacks across their Atomized Network, remediate them within hours, and improve DDoS resiliency. He even points to one notable example of helping a client under attack.
Read More
Unleashing Intelligence: Transforming NetFlow and Flow Log Data into Actionable Intelligence
Raw data in isolation lacks meaning and utility, but Netography turns data into actionable intelligence by using NetFlow to enrich it with relevant context.
Read More
Netography Fusion Enhancements Give SOC, NOC, and AIOps Teams Faster Detection and Response to Anomalies and Threats, Automated Context Label Creation
The latest release of Netography Fusion improves your SOC, NOC, and AIOPs teams’ ability to accelerate and simplify their detection and response workflows and automate context label creation.
Read More
Detecting Compromises of NetScaler (Citrix) ADC and Gateway with NetFlow
NetFlow is a powerful tool for answering post-compromise questions, in this case, the RCE vulnerability affecting NetScaler (formerly Citrix) Application Delivery Controller (ADC) and NetScaler Gateway (CVE-2023-3519).
Read More
SentinelOne Context Integration with Netography Fusion Accelerates Investigation, Incident Response, and Policy Enforcement
Our Netography Fusion® platform now enables customers to leverage data collected by your SentinelOne agents to accelerate their investigation, incident response, and policy enforcement within the Fusion platform.
Read More
Four Ways to Quickly Determine Your Atomization Issue and Next Steps to Fix it
As networks are atomizing they are becoming more difficult to protect with the standard methods. In our latest blog, Martin Roesch describes the where, when, what, and how of these network traffic monitoring and security…
Read More
Netography Joins Wiz Integration (WIN) Platform, Speeding Vulnerability Management for Joint Customers
Netography now integrates with Wiz to accelerate and simplify detection and mitigation of malicious activity targeting cloud assets. A true “better together” partnership and we remain proud to be part of the Wiz Integration (WIN)…
Read More
Diving into Digital Darkness: From Startup Birth to Patent-Proven
Netography has been issued two patents with broad claim coverage in our core focus area of creating a defense platform for cloud and on-prem networks. Co-founder Barrett Lyon writes more about the patents and Netography’s…
Read More
A Match Made in the Cloud: Mercury and Netography
Last week Branden Wagner of Mercury and Martin Roesch of Netography discussed the urgency of effective network monitoring and security in current complex infrastructures -- and much more.
Read More
Situational Awareness for Detection and Analysis: Go with the Flow
Martin Roesch explains why Netography believes situational awareness vs. pure inspection for threat detection is fundamentally different and a better approach for the Atomized Network.
Read More
Compromise Detection vs. Threat Detection: Why ‘Right of Boom’ Now
In the past, the focus has been on threat detection to prevent attacks, but in the modern Atomized Network it becomes impossible to guard against everything. Instead there should be a focus on compromise detection…
Read More
Day In the Life: SOC Analyst
SOC teams always feel like they are having to play catch-up on detections, because without the ability to add criticality and context to devices, all devices are considered equal- causing wasted time searching for additional…
Read More
Netography Detection Model Release – May 1, 2023
The Netography Threat Research Team has updated several new detection models to improve efficacy for customers, as well as NDMs for post compromise to use generated intelligence and to look for activity on high port…
Read More
Netography Detection Model Release – April 24, 2023
The Netography Threat Research Team has released its latest updates to monitor outbound traffic for the allowed usage of cleartext protocols. There are also new alerts for post compromise to monitor internal IP actions for…
Read More
Day In the Life: Network Operations Manager
“The network is slow”. Years ago, a network operations manager would have relied on packet captures to solve this, but now networks are dynamic, encrypted, ephemeral, and diverse and require new tools to gain a…
Read More
Where Network Atomization Meets Abstract Modernism: Netography at RSA Conference
Netography will be at RSA Conference at Booth #4116 in the Moscone South Corridor, where you can meet with the Netography team of experts who can show you our cloud-native Netography Fusion platform and how…
Read More
FICO Explains: Why Netography and Why Now?
Read our interview with Shannon Ryan, Sr. Director, Cybersecurity at FICO, as he talks about why FICO needs Netography – and why now.
Read More
Netography Detection Model Release – April 11, 2023
The Netography Threat Research Team has released its latest detection model updates to include port scanning internal resources for the detection of vulnerabilities, abuse, or attacks on customer networks, as well as new vulnerabilities in…
Read More
Implementing a Social Media Governance Control and Configuration Validation Program
Organizations unsuccessfully rely on solutions to block or monitor social media use to prevent risk, privacy regulations, or allowing attackers into the network but Netography’s social media dashboards help enforce policies.
Read More
Netography Detection Model Release – April 4, 2023
The Netography Threat Research Team has released its latest detection model updates that include the detection of a wide range of global chat and messaging applications on customer networks.
Read More
Solving the Tower of Babel Challenge
Modern networks are challenged by being atomized and diverse, with security teams trying to make cohesive sense out of multiple different security technologies using different languages. Martin Roesch calls this the “Tower of Babel” problem.
Read More
Netography Detection Model Release – March 20, 2023
The Netography Threat Research Team has released its latest detection model updates of several optimizations of existing detections to reduce noise and provide more accurate alerts.
Read More
Demystifying Network Security, Visibility, and Control: A Buyer’s Guide
Written by security professionals for security professionals, our new Buyer’s Guide helps you demystify how network security has evolved and what you need to look for in categories of solutions and capabilities.
Read More
Netography Detection Model Release – March 13, 2023
The Netography Threat Research Team has released its latest detection model updates, including several optimizations of existing detections to reduce noise and provide more accurate alerts, and new detection models to detect DNS amplification attacks…
Read More
Beyond IP Addresses: Getting to Context of Value
Detection and response in the Atomized Network requires a contextualized view to determine if something is malicious, out of compliance, or of concern to operational governance.
Read More
From Past to Future: Why I Joined Netography
New Chief Product Officer David Meltzer shares his thoughts on why he is excited to join Netography
Read More
Netography Detection Model Release – February 27, 2023
The Netography Threat Research Team has released its latest detections which include dashboard widgets and visibility on the use of social networks, torrents, and file sharing on Atomized Networks.
Read More
Netography Detection Model Release – February 23, 2023
The Netography Threat Research Team has released its latest detections which include dashboard widgets and visibility on the use of social networks, torrents, and file sharing on Atomized Networks.
Read More
Tackle TikTok Bans and Social Media Policy Changes with Operational Governance
In the wake of many governments and organizations banning TikTok and social media usage on employee devices, Netography has introduced a new operational governance dashboard that provides analysts with real-time comprehensive views of all social…
Read More
Tags and Labels – Make Sense of Multi-Cloud, Hybrid, and On-Premises Networks in an Atomized Network World.
Tags and labels are essential for providing visibility, context, automation, and operational governance into modern Atomized Networks, which are made up of multi-cloud, hybrid, and on-premises networks.
Read More
What Boards Need to Know About GRC and Atomized Networks
The SEC is proposing new regulations for cybersecurity GRC. This is forcing CEOs and board members to assess and understand how, in the Atomized Network, coverage and compliance is difficult to achieve.
Read More
Netography Detection Model Release – February 13, 2023
Latest detections include attempted scanning to discover OpenSLP servers, large data transfer from common database ports leaving the network, and inbound attempts to connect to SSH and RDP ports from ITAR-listed countries.
Read More
Netography Detection Model Release – February 7, 2023
The Netography Threat Research Team has released its latest detections. Netography Detection Models (NDMs) detect botnets, malware, P2P, data exfiltration, ransomware, phishing, SPAM, DDoS activity, and more.
Read More
5 Reasons Your NDR Project Missed The Mark
As networks change, many expected NDR outcomes are falling short, even after security teams put in the work and research to correctly deploy them. Environments have become too dispersed, ephemeral, encrypted, and diverse to make…
Read More
3 Trends in Successful Threat Hunting Across Networks in a Multi-Cloud World
To be effective, threat hunters need a unified view of all data across the entire ecosystem to give gap-free, real-time visibility into east-west traffic.
Read More
Driving To Gapless Visibility – Why Real-Time Network Visibility From Data Center To Cloud Is Essential
It’s common today for encryption to make it more difficult to detect evidence of data being stolen or to assess what part of the organization or network has been compromised –failing to actually protect the…
Read More
To Secure the Atomized Network, Don’t Bring a Knife to a Gunfight
Trying to secure today’s Atomized Networks with network security architectures designed decades ago and pieced together is like bringing a knife to a gunfight.
Read More
Social Media Traffic Monitoring – From Thought Police to Security Priority
As the use of social media expands, so does the risk of having it used on devices that touch your network, making social media traffic monitoring an important endeavor for security teams.
Read More
Having Your Cake (Real-Time Visibility of all Network Flows) Without the Cost (SIEM Expenses)
Unleash a superpower for threat hunters with Atomized Visibility and Control Platforms (AVCP), which provide real-time visibility of all flow records, plus retrospective searches, enabling teams to search millions of flow records in just seconds…
Read More
Multi-Cloud Strategies and Netography: Gain without the Pain
There are a number of good reasons why organizations choose multi-cloud, but these also can create pain for security teams needing consistent visibility into network traffic moving to, from, between, and within clouds.
Read More
Dealing with Drift and Networks Across Multi-Cloud Deployments
A big challenge with developing enterprise software fast and deploying quickly is drift – when the infrastructure does not match what was designed and tested.
Read More
Raise your hand if you have a pervasive view of your network…anyone?
Given how enterprise networks have become atomized, and how traditional network security technologies have been engineered, we’re dealing with far too many blind spots.
Read More
Multi-Cloud Architectures Driving Changes for Compliance and Audit Requirements
We live in a multi-cloud world. Data, applications, and systems now span corporate data centers, colocation cages, multiple clouds, edge locations, and IoT. The need for enterprises to have security policies that meet compliance requirements…
Read More
Unraveling The Clues: Delivering On The Promise Of High-Fidelity, Actionable Alerts
Netography Fusion shows the who, what, and where as important data points for enrichment to create true, high-fidelity, actionable alerts worthy of an outcome.
Read More
More than a Data Store. An Intelligent Approach to Flow Data Usage
The Netography Fusion platform was built from the start with the approach of deeply understanding customers’ unique problems and designing around providing the specific answers needed to focus on the problems they actually want to…
Read More
Network Excavation: Going Beyond What Your Existing Tools Can Tell You
The Netography Threat Research Team was formed with automation, proactive research, and machine learning in mind. The team is constantly questioning how they can develop new detections and proactively defend customers without having to dedicate…
Read More
Netography Integrates with CrowdStrike Falcon to Automate Network Security on Endpoints
Netography Fusion's newest integration has now added the capability to quarantine endpoints that are protected by CrowdStrike Falcon.
Read More
Unlocking the Power of Organizational Context: The Devil is in the Details
To figure out the who, what, and where of an alert, the security industry has built large data repositories that accept massive volumes of disparate pieces of information but finding what data is relevant is…
Read More
Legacy Effect: Why Innovation is Hard for Decades-old Companies.
Legacy services for traditional network visibility and detection companies have a hard time innovating when the market has evolved.
Read More
A Guide to Netography Query Language (NQL)
The Netography Query Language enables users to search enriched network traffic, use custom searches, and respond to suspicious traffic.
Read More
Five Business Drivers for Visibility and Control of the Atomized Network
Atomized Networks are causing every operational team in an organization to struggle with the composition and activities of their networks.
Read More
Designing Security Solutions for Organizational Resilience
The distributed nature of workloads makes them hard to defend without security solutions against the attackers who live in the gaps.
Read More
The Four Horsemen of Network Security
One of the organizing principles for network security is there are four fundamental things to secure—users, applications, data, and devices.
Read More
Four Ways Our Customers Win With API-Driven, Bi-Directional Integration
For organizations to detect cyber threats and defend the Atomized Network there needs a priority on security interoperability and integration.
Read More
Netography Integrates with CrowdStrike Making it Easier to Sync Context
As corporate networks, endpoints, multi-cloud, and edge deployments get more complex, analysts, incident responders, threat hunters, forensics teams, and auditors need context for what they see. We have integrated our Netography Fusion® platform with CrowdStrike…
Read More
Netography Fusion Advances Network Security and Visibility with Multiple Updates
The latest release of Netography Fusion provides much more functionality and an improved customer experience for security operations center (SOC) and cloud operations teams.
Read More
Security Scope and the Threat Continuum. What CISOs Need to Know.
Netography is architected to quickly replace the network-based security capabilities that atomization and encryption have eroded. And we can do it with a broader scope for more extensive coverage of the threat continuum.
Read More
What Does East-West Mean in an Atomized Network?
The traditional view of east-west doesn’t really exist anymore. We can no longer point to a location and say that something exists in this physical space. We’re now dealing with a dynamic environment that is…
Read More
Atomized Network is an “And” not an “Or”: Driving to Cloud Transformation
The Atomized Network is an “and,” not an “or”. As your environment morphs, Netography morphs with you to secure what your Atomized Network looks like now and how it will look over time.
Read More
Netography’s Incremental Value to the Network Team
The Atomized Network creates new challenges for the security team, but also the network team. Netography delivers value to both.
Read More
How FICO Gained Visibility and Control to Secure its Atomized Network
FICO achieved operational, technology, and business benefits from Netography Fusion. Read on to learn how.
Read More
The Hidden Costs of Appliance-Based Models
Considering an appliance-based architecture to secure your atomized network? First, think about the massive hidden costs of lifecycle management, spec'ing and sizing, software upgrades, people hours, and so much more.
Read More
Threat Detection for your Multi-Cloud Environment
Unless we think of the cloud as an extension of our on-prem environment and have complete network visibility across the entire enterprise footprint, we are destined for failure when it comes to protecting the entire…
Read More
ICYMI: Top 5 Blogs on Securing the Atomized Network
We are in the middle of a doctrinal shift in the security industry that requires new technology innovation. These blogs provide an overview.
Read More
The Compliance Advantage: Metadata vs. DPI
The way to narrow the scope of compliance and at the same time mitigate risk is to either reduce the need to have access to sensitive data or use tools that don’t rely on DPI…
Read More
Netography at Black Hat: Adapt to Change and Discover Your Atomized Network
How can you gain visibility into the Atomized Network? By adapting and adjusting to change by moving to solutions that give you visibility and control. Learn more by visiting Netography at Black Hat in Las…
Read More
Modern security interoperability for the Atomized Network
When security interoperability is designed based on outcomes, enterprises benefit from an integration strategy that spans the full gamut from detection to remediation—with humans in-the-loop, or not—with precision and speed.
Read More
All security innovation comes from startups
Security innovation comes from startups full of passionate people instead of old companies focused on optimizing portfolios of acquired startups, leading to offerings that feel like “20 startups in a trench coat.”
Read More
Live off the land: The fundamental rethink for Zero Trust SecOps
With network metadata, enterprises can address one of their highest security priorities this year and move to Zero Trust with confidence.
Read More
The future of security solutions is cloud-native
A cloud-native platform means security leaders can get ahead of advancing complexity to embrace the flexibility of the cloud with confidence and—best of all—do so on their terms.
Read More
Moving to the cloud while strengthening defense
Gain complete visibility and apply a single, consistent layer of detection, response, and remediation across all your environments. You can strengthen security and move to the cloud, and you can start now.
Read More
Zero Trust: Faustian bargain?
With no hardware, no software, and nothing to install, you can quickly replace the network visibility you’re rapidly losing in a Zero Trust world and complement EDR with capabilities you’ve never had before to better…
Read More
The rise of the Atomized Network and how to secure it
We closely examine the Atomized Network, why it is difficult to defend, the limitations of the most prevalent solutions, and the need to secure it.
Read More
Cloud security: Unlocking the power of network metadata
Netography grew up developing technology that allows companies to take advantage of the cloud as a great enabler without struggling to defend it.
Read More
Threat detection with network metadata vs. DPI
Traditional DPI-based network threat detection appliances will have a role to play in your technology stack for a while. But there’s no doubt their usefulness is diminishing.
Read More
In an EDR-focused world, you still need network visibility
EDR is a powerful tool, but it leaves cracks in your security stack. You need an agentless and passive detection approach for more comprehensive protection. Netography fills the gaps, complementing EDR to provide complete coverage…
Read More
Complexity is the enemy of security, so live off the land
While block listing and allow listing will likely continue to serve a function in the security team’s toolbox, you also need a way to see the nuances of gray to truly achieve securing your Atomized…
Read More
Reality is grey, not block or allow
While block listing and allow listing will likely continue to serve a function in the security team’s toolbox, you also need a way to see the nuances of gray to truly achieve securing your Atomized…
Read More
Barrett Lyon, Netography: “network metadata is abundant and badly underutilized in most IT environments”
With the pandemic unexpectedly locking everyone at home and closing offices, most organizations made a sudden and rapid switch to cyberspace. This resulted in companies getting many different applications that were never meant to work…
Read More
In the Atomized Network appliances are a dead end. Think outside the box.
Conventional threat detection and application-aware security on the network has historically required DPI appliances that were deployed in the middle of network traffic. In the Atomized Network, there is no middle anymore.
Read More
Threat Detection with Zero Deployment
One beautiful part about the Netography Fusion platform is our Threat Research Team’s ability to instantly roll out new threat detection models at any time to detect and provide visibility into threats on customer networks.…
Read More
Megatrends and the doctrinal shift in enterprise security
We’ve seen an interesting progression over the last decade in how we think about the cloud and security. As organizations started moving to the cloud, it became apparent that compared to what was possible in…
Read More
Protecting the Atomized Network: What CISOs Need to Know
We know that the cybersecurity technology landscape can be confusing, particularly when it comes to defending today’s scattered and fluid computing environments. And all the acronyms don’t help: CSPM, CNAPP, EDR, EPP, NDR…It seems the…
Read More
Comparing Cloud Provider Flow Logs
On your marks, get set, Bake! The Netography team has been recently watching "The Great British Baking Show," and admittedly, we're ALL hooked. Many of us honed new skills in the kitchen around baking over…
Read More
The 8 Must Haves for Network Detection & Response
Spending in the cybersecurity marketplace continues to grow at a fast pace. Cloud security spending will reach $12.6B on security tools by 2023. It’s no surprise there are a massive amount of solutions that claim…
Read More
Cryptojacking – The Latest Threat to Keep You Up At Night
If the current threat landscape wasn’t enough to keep you up at night, you can now add Cryptojacking attacks to the list. According to NTT’s 2021 Global Threat Intelligence Report, 41% of all malware detected…
Read More