Skip to main content
May 17, 2024 in Blog

Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion

The concept of a Zero Trust Architecture (ZTA) is pretty simple – trust no one, verify everyone. No user or device should be trusted automatically, even if they are connected to a permissioned environment or…
Read More
April 24, 2024 in Blog

“You Can’t Protect What You Can’t See” Still Rings True. Why Observability Now.

Remember the old saying: “You can’t protect what you can’t see”? When I started preaching about it as part of the marketing launch for Real-time Network Awareness (RNA) it seemed pretty obvious that we needed…
Read More
April 3, 2024 in Blog

Yellowstone Ranch 2.0: Protecting Your Multi-cloud and Hybrid “Herd” with Trust Boundaries

Like many of you, I’ve been sucked into the Yellowstone series. Having grown up and lived my entire life in a congested corner of Massachusetts, the series may as well have taken place on the…
Read More
March 26, 2024 in Blog

How to Close the Visibility Gaps Across Your Multi-Cloud Environment

Nearly 90% of organizations have a multi-cloud environment today. However, those environments create operational challenges for teams that are responsible for ensuring availability and maintaining compliance with policies. Too often operations teams lack the oversight…
Read More
March 14, 2024 in Blog

Getting to High-Fidelity Detections Faster with Context Creation Models

In this new blog, James Pittman describes how dynamic context creation models in Netograpy Fusion use attributes from your tech stack to generate high fidelity detections that reduce alert overload.
Read More
March 7, 2024 in Blog

The Need for East-West Observability to Protect Against Compromised IAM

In his new blog, Martin Roesch describes how leveraging an immutable source of truth you can trust – your network – provides East-West observability to get ahead of attackers when your IAM has been subverted…
Read More
February 1, 2024 in Blog

The SOC 2 Effect: Elevating Security and Trust in Netography Fusion

An insider’s view of some important lessons learned during Netography’s journey to achieve SOC 2 compliance and its benefits to our customers.
Read More
January 30, 2024 in Blog

Don’t Misdefine Network Security in 2024: Include On-Prem and Cloud

Cloud networks contain valuable security information, but without a way to gather and analyze that data, you are missing out on a comprehensive view of what’s happening and what should never occur.
Read More
January 25, 2024 in Blog

A CISO Explains: How Netography Defends Critical Infrastructure

Read the recap of our online discussion with Jason Waits, CISO at Inductive Automation. He explains how his security team used the Netography Fusion® Network Defense Platform (NDP) to advance his network defenses beyond traditional…
Read More
January 4, 2024 in Blog

Netography Fusion Expands Microsoft Integrations for Greater Context Enrichment and Faster Compromise Detection

Netography Fusion adds Microsoft Defender for Endpoint and Microsoft Defender XDR integrations, enabling customers with faster detection of and response to compromises with context from Microsoft-managed identities, email, endpoints, and cloud apps.
Read More
December 13, 2023 in Blog

Why It’s Time to Evolve from Threat-centric to Compromise-centric Security

In his new blog, Martin Roesch explains why we all need to change our focus when we think about detections, and evolve from threat-centric to compromise-centric approaches.
Read More
December 5, 2023 in Blog

The One-Two Punch of Frictionless Network Defense

This blog by Martin Roesch explains how Netography’s new approach of a frictionless network defense strategy was built on the concepts of frictionless deployment with no appliances, sensors, or agents, and our ecosystem of third-party…
Read More
November 15, 2023 in Blog

Recipe for an Actionable Alert

In this new blog by By Dan Ramaswami he gives his recipe for an actionable alert using Netography to combine the ingredients of data and context from host, user, application, and governance and compliance information…
Read More
November 9, 2023 in Blog

Netography Releases Detection for Actively Exploited DoS Amplification CVE-2023-29552

To respond to this threat, Netography has released a new Netography Detection Model (NDM), called “slpreflection”, which will detect floods of traffic originating from the SLP port (427).
Read More
November 7, 2023 in Blog

Insights from Security Mavericks: Interpublic Group, FICO, and Mercury

Our webinar “Security Mavericks: Interpublic Group, FICO, and Mercury” is available to watch on-demand or read the recap, where Troy Wilkinson, Interpublic Group, Shannon Ryan, FICO, and Branden Wagner, Mercury, talked about the surprises and…
Read More
October 31, 2023 in Blog

Managing the Chaos with Context

Event sources continue to grow, creating alert fatigue from all the noise that security teams have to analyze to determine if there is a compromise, and context is needed to manage this chaos.
Read More
October 20, 2023 in Blog

Netography Fusion Detects Post-Compromise Behavior from Critical Cisco Zero-Day Vulnerability

Active exploitation of this vulnerability installs a malware implant on affected devices allowing attackers to execute arbitrary commands with full privileges. Unlike single-event-based detections, Netography detection models only trigger after observing follow-on exploitation behavior of…
Read More
October 12, 2023 in Blog

Useful, Challenging, Ineffectual: Three Ways to Look at DPI

Martin Roesch explains the situations where DPI is still useful, where it is costly, and where it is ineffective, and how Netography Fusion works as a 100% SaaS platform with DPI to achieve more effective…
Read More
October 5, 2023 in Blog

Context-Enriched Metadata Reduces Your Teams’ Workloads

The ability to enrich metadata with attributes from applications and services in your tech stack significantly reduces the time your SecOps, NetOps, and CloudOps teams.
Read More
October 2, 2023 in Blog

Launching Tomorrow: CyberPsych Podcast with Dr. Stacy Thayer

We are very excited to announce the launch of our new podcast, CyberPsych. In an era where the digital landscape is continuously evolving and cybersecurity concerns are at an all-time high, CyberPsych aims to shed…
Read More
September 20, 2023 in Blog

Jeff Nathan: Build Discipline into Threat Research for Detection Engineering that Benefits Customers

We are excited to have Jeff Nathan as our Director of Detection Engineering. His experience applying discipline to threat research to solve complex problems, and his passion for building “always-learning” teams, are a great win…
Read More
September 13, 2023 in Blog

The Enterprise Market Shift to Network Defense Platform

Martin Roesch discusses how Netography pioneered the creation of a Network Defense Platform (NDP) as a way to address these changes and created a new approach to network monitoring and security, bringing everything from your…
Read More
September 6, 2023 in Blog

Contextual Awareness in Network Detections

In his new blog, Mal Fitzgerald talks about how Netography applies contextual awareness to address custom network challenges and security concerns.
Read More
August 29, 2023 in Blog

The Evolution of NDP: Finding Our Fit in the Technological Landscape

Co-founder and chief architect of Netography Barrett Lyon knew security technology would need to evolve as networks became more atomized. His new blog discusses his and Dan Murphy’s journey to build the NDP category for…
Read More
August 24, 2023 in Blog

The Travel Bug: NetSec Edition

As a network admin, Mal Fitzgerald used tools for network monitoring, but all had the glaring weakness of blind spots. His new blog discusses how Netography lets network security engineers monitor their entire network from…
Read More
August 15, 2023 in Blog

NIST + Govern = A Welcome Addition

Governance is one of the key use cases that our customers demand from Netography Fusion, which puts us well in step with NIST’s recent announcement to add Govern as a core function of its Cybersecurity…
Read More
August 15, 2023 in Blog

The Time for Netography Fusion Is Now

The time is now for Netography Fusion to break through the barriers and provide real-time, end-to-end visibility to help reduce atomization – of networks and organizations.
Read More
August 1, 2023 in Blog

Network Defense Platform: The Evolution Needed for Modern Enterprise Security

Network Defense Platforms give comprehensive real-time visibility of cloud and on-prem traffic to validate governance, and monitor, detect, and respond to compromises
Read More
July 27, 2023 in Blog

Netography: Getting Beyond the ‘Black Box’ Approach to DDoS

Netography helps organizations understand emergent attacks across their Atomized Network, remediate them within hours, and improve DDoS resiliency. He even points to one notable example of helping a client under attack.
Read More
July 26, 2023 in Blog

Unleashing Intelligence: Transforming NetFlow and Flow Log Data into Actionable Intelligence

Raw data in isolation lacks meaning and utility, but Netography turns data into actionable intelligence by using NetFlow to enrich it with relevant context.
Read More
July 24, 2023 in Blog

Netography Fusion Enhancements Give SOC, NOC, and AIOps Teams Faster Detection and Response to Anomalies and Threats, Automated Context Label Creation

The latest release of Netography Fusion improves your SOC, NOC, and AIOPs teams’ ability to accelerate and simplify their detection and response workflows and automate context label creation.
Read More
July 24, 2023 in Blog

Detecting Compromises of NetScaler (Citrix) ADC and Gateway with NetFlow

NetFlow is a powerful tool for answering post-compromise questions, in this case, the RCE vulnerability affecting NetScaler (formerly Citrix) Application Delivery Controller (ADC) and NetScaler Gateway (CVE-2023-3519).
Read More
July 13, 2023 in Blog

SentinelOne Context Integration with Netography Fusion Accelerates Investigation, Incident Response, and Policy Enforcement

Our Netography Fusion® platform now enables customers to leverage data collected by your SentinelOne agents to accelerate their investigation, incident response, and policy enforcement within the Fusion platform.
Read More
June 27, 2023 in Blog

Four Ways to Quickly Determine Your Atomization Issue and Next Steps to Fix it

As networks are atomizing they are becoming more difficult to protect with the standard methods. In our latest blog, Martin Roesch describes the where, when, what, and how of these network traffic monitoring and security…
Read More
June 21, 2023 in Blog

Netography Joins Wiz Integration (WIN) Platform, Speeding Vulnerability Management for Joint Customers

Netography now integrates with Wiz to accelerate and simplify detection and mitigation of malicious activity targeting cloud assets. A true “better together” partnership and we remain proud to be part of the Wiz Integration (WIN)…
Read More
June 14, 2023 in Blog

Diving into Digital Darkness: From Startup Birth to Patent-Proven

Netography has been issued two patents with broad claim coverage in our core focus area of creating a defense platform for cloud and on-prem networks. Co-founder Barrett Lyon writes more about the patents and Netography’s…
Read More
June 8, 2023 in Blog

A Match Made in the Cloud: Mercury and Netography

Last week Branden Wagner of Mercury and Martin Roesch of Netography discussed the urgency of effective network monitoring and security in current complex infrastructures -- and much more.
Read More
May 23, 2023 in Blog

Situational Awareness for Detection and Analysis: Go with the Flow

Martin Roesch explains why Netography believes situational awareness vs. pure inspection for threat detection is fundamentally different and a better approach for the Atomized Network.
Read More
May 16, 2023 in Blog

Compromise Detection vs. Threat Detection: Why ‘Right of Boom’ Now

In the past, the focus has been on threat detection to prevent attacks, but in the modern Atomized Network it becomes impossible to guard against everything. Instead there should be a focus on compromise detection…
Read More
May 11, 2023 in Blog

Day In the Life: SOC Analyst

SOC teams always feel like they are having to play catch-up on detections, because without the ability to add criticality and context to devices, all devices are considered equal- causing wasted time searching for additional…
Read More
May 2, 2023 in Blog

Netography Detection Model Release – May 1, 2023

The Netography Threat Research Team has updated several new detection models to improve efficacy for customers, as well as NDMs for post compromise to use generated intelligence and to look for activity on high port…
Read More
April 25, 2023 in Blog

Netography Detection Model Release – April 24, 2023

The Netography Threat Research Team has released its latest updates to monitor outbound traffic for the allowed usage of cleartext protocols. There are also new alerts for post compromise to monitor internal IP actions for…
Read More
April 20, 2023 in Blog

Day In the Life: Network Operations Manager

“The network is slow”. Years ago, a network operations manager would have relied on packet captures to solve this, but now networks are dynamic, encrypted, ephemeral, and diverse and require new tools to gain a…
Read More
April 18, 2023 in Blog

Where Network Atomization Meets Abstract Modernism: Netography at RSA Conference

Netography will be at RSA Conference at Booth #4116 in the Moscone South Corridor, where you can meet with the Netography team of experts who can show you our cloud-native Netography Fusion platform and how…
Read More
April 11, 2023 in Blog

FICO Explains: Why Netography and Why Now?

Read our interview with Shannon Ryan, Sr. Director, Cybersecurity at FICO, as he talks about why FICO needs Netography – and why now.
Read More
April 11, 2023 in Blog

Netography Detection Model Release – April 11, 2023

The Netography Threat Research Team has released its latest detection model updates to include port scanning internal resources for the detection of vulnerabilities, abuse, or attacks on customer networks, as well as new vulnerabilities in…
Read More
April 6, 2023 in Blog

Implementing a Social Media Governance Control and Configuration Validation Program

Organizations unsuccessfully rely on solutions to block or monitor social media use to prevent risk, privacy regulations, or allowing attackers into the network but Netography’s social media dashboards help enforce policies.
Read More
April 4, 2023 in Blog

Netography Detection Model Release – April 4, 2023

The Netography Threat Research Team has released its latest detection model updates that include the detection of a wide range of global chat and messaging applications on customer networks.
Read More
March 23, 2023 in Blog

Solving the Tower of Babel Challenge

Modern networks are challenged by being atomized and diverse, with security teams trying to make cohesive sense out of multiple different security technologies using different languages. Martin Roesch calls this the “Tower of Babel” problem.
Read More
March 21, 2023 in Blog

Netography Detection Model Release – March 20, 2023

The Netography Threat Research Team has released its latest detection model updates of several optimizations of existing detections to reduce noise and provide more accurate alerts.
Read More
March 15, 2023 in Blog

Demystifying Network Security, Visibility, and Control: A Buyer’s Guide

Written by security professionals for security professionals, our new Buyer’s Guide helps you demystify how network security has evolved and what you need to look for in categories of solutions and capabilities.
Read More
March 14, 2023 in Blog

Netography Detection Model Release – March 13, 2023

The Netography Threat Research Team has released its latest detection model updates, including several optimizations of existing detections to reduce noise and provide more accurate alerts, and new detection models to detect DNS amplification attacks…
Read More
March 13, 2023 in Blog

Beyond IP Addresses: Getting to Context of Value

Detection and response in the Atomized Network requires a contextualized view to determine if something is malicious, out of compliance, or of concern to operational governance.
Read More
March 9, 2023 in Blog

From Past to Future: Why I Joined Netography

New Chief Product Officer David Meltzer shares his thoughts on why he is excited to join Netography
Read More
February 28, 2023 in Blog

Netography Detection Model Release – February 27, 2023

The Netography Threat Research Team has released its latest detections which include dashboard widgets and visibility on the use of social networks, torrents, and file sharing on Atomized Networks.
Read More
February 23, 2023 in Blog

Netography Detection Model Release – February 23, 2023

The Netography Threat Research Team has released its latest detections which include dashboard widgets and visibility on the use of social networks, torrents, and file sharing on Atomized Networks.
Read More
February 22, 2023 in Blog

Tackle TikTok Bans and Social Media Policy Changes with Operational Governance

In the wake of many governments and organizations banning TikTok and social media usage on employee devices, Netography has introduced a new operational governance dashboard that provides analysts with real-time comprehensive views of all social…
Read More
February 16, 2023 in Blog

Tags and Labels – Make Sense of Multi-Cloud, Hybrid, and On-Premises Networks in an Atomized Network World.

Tags and labels are essential for providing visibility, context, automation, and operational governance into modern Atomized Networks, which are made up of multi-cloud, hybrid, and on-premises networks.
Read More
February 14, 2023 in Blog

What Boards Need to Know About GRC and Atomized Networks

The SEC is proposing new regulations for cybersecurity GRC. This is forcing CEOs and board members to assess and understand how, in the Atomized Network, coverage and compliance is difficult to achieve.
Read More
February 13, 2023 in Blog

Netography Detection Model Release – February 13, 2023

Latest detections include attempted scanning to discover OpenSLP servers, large data transfer from common database ports leaving the network, and inbound attempts to connect to SSH and RDP ports from ITAR-listed countries.
Read More
February 7, 2023 in Blog

Netography Detection Model Release – February 7, 2023

The Netography Threat Research Team has released its latest detections. Netography Detection Models (NDMs) detect botnets, malware, P2P, data exfiltration, ransomware, phishing, SPAM, DDoS activity, and more.
Read More
February 6, 2023 in Blog

5 Reasons Your NDR Project Missed The Mark

As networks change, many expected NDR outcomes are falling short, even after security teams put in the work and research to correctly deploy them. Environments have become too dispersed, ephemeral, encrypted, and diverse to make…
Read More
February 1, 2023 in Blog

3 Trends in Successful Threat Hunting Across Networks in a Multi-Cloud World

To be effective, threat hunters need a unified view of all data across the entire ecosystem to give gap-free, real-time visibility into east-west traffic.
Read More
January 26, 2023 in Blog

Driving To Gapless Visibility – Why Real-Time Network Visibility From Data Center To Cloud Is Essential

It’s common today for encryption to make it more difficult to detect evidence of data being stolen or to assess what part of the organization or network has been compromised –failing to actually protect the…
Read More
January 19, 2023 in Blog

To Secure the Atomized Network, Don’t Bring a Knife to a Gunfight

Trying to secure today’s Atomized Networks with network security architectures designed decades ago and pieced together is like bringing a knife to a gunfight.
Read More
January 17, 2023 in Blog

Social Media Traffic Monitoring – From Thought Police to Security Priority

As the use of social media expands, so does the risk of having it used on devices that touch your network, making social media traffic monitoring an important endeavor for security teams.
Read More
January 11, 2023 in Blog

Having Your Cake (Real-Time Visibility of all Network Flows) Without the Cost (SIEM Expenses)

Unleash a superpower for threat hunters with Atomized Visibility and Control Platforms (AVCP), which provide real-time visibility of all flow records, plus retrospective searches, enabling teams to search millions of flow records in just seconds…
Read More
January 9, 2023 in Blog

Multi-Cloud Strategies and Netography: Gain without the Pain

There are a number of good reasons why organizations choose multi-cloud, but these also can create pain for security teams needing consistent visibility into network traffic moving to, from, between, and within clouds.
Read More
January 5, 2023 in Blog

Dealing with Drift and Networks Across Multi-Cloud Deployments

A big challenge with developing enterprise software fast and deploying quickly is drift – when the infrastructure does not match what was designed and tested.
Read More
December 21, 2022 in Blog

Raise your hand if you have a pervasive view of your network…anyone?

Given how enterprise networks have become atomized, and how traditional network security technologies have been engineered, we’re dealing with far too many blind spots.
Read More
December 15, 2022 in Blog

Multi-Cloud Architectures Driving Changes for Compliance and Audit Requirements

We live in a multi-cloud world. Data, applications, and systems now span corporate data centers, colocation cages, multiple clouds, edge locations, and IoT. The need for enterprises to have security policies that meet compliance requirements…
Read More
December 6, 2022 in Blog

Unraveling The Clues: Delivering On The Promise Of High-Fidelity, Actionable Alerts

Netography Fusion shows the who, what, and where as important data points for enrichment to create true, high-fidelity, actionable alerts worthy of an outcome.
Read More
December 1, 2022 in Blog

More than a Data Store. An Intelligent Approach to Flow Data Usage

The Netography Fusion platform was built from the start with the approach of deeply understanding customers’ unique problems and designing around providing the specific answers needed to focus on the problems they actually want to…
Read More
November 29, 2022 in Blog

Network Excavation: Going Beyond What Your Existing Tools Can Tell You

The Netography Threat Research Team was formed with automation, proactive research, and machine learning in mind. The team is constantly questioning how they can develop new detections and proactively defend customers without having to dedicate…
Read More
November 15, 2022 in Blog

Netography Integrates with CrowdStrike Falcon to Automate Network Security on Endpoints

Netography Fusion's newest integration has now added the capability to quarantine endpoints that are protected by CrowdStrike Falcon. 
Read More
November 10, 2022 in Blog

Unlocking the Power of Organizational Context: The Devil is in the Details

To figure out the who, what, and where of an alert, the security industry has built large data repositories that accept massive volumes of disparate pieces of information but finding what data is relevant is…
Read More
November 2, 2022 in Blog

Legacy Effect: Why Innovation is Hard for Decades-old Companies.

Legacy services for traditional network visibility and detection companies have a hard time innovating when the market has evolved.
Read More
October 27, 2022 in Blog

A Guide to Netography Query Language (NQL)

The Netography Query Language enables users to search enriched network traffic, use custom searches, and respond to suspicious traffic.
Read More
October 25, 2022 in Blog

Five Business Drivers for Visibility and Control of the Atomized Network

Atomized Networks are causing every operational team in an organization to struggle with the composition and activities of their networks.
Read More
October 18, 2022 in Blog

Designing Security Solutions for Organizational Resilience

The distributed nature of workloads makes them hard to defend without security solutions against the attackers who live in the gaps.
Read More
October 12, 2022 in Blog

The Four Horsemen of Network Security

One of the organizing principles for network security is there are four fundamental things to secure—users, applications, data, and devices.
Read More
October 4, 2022 in Blog

Four Ways Our Customers Win With API-Driven, Bi-Directional Integration

For organizations to detect cyber threats and defend the Atomized Network there needs a priority on security interoperability and integration.
Read More
September 29, 2022 in Blog

Netography Integrates with CrowdStrike Making it Easier to Sync Context

As corporate networks, endpoints, multi-cloud, and edge deployments get more complex, analysts, incident responders, threat hunters, forensics teams, and auditors need context for what they see. We have integrated our Netography Fusion® platform with CrowdStrike…
Read More
September 27, 2022 in Blog

Netography Fusion Advances Network Security and Visibility with Multiple Updates

The latest release of Netography Fusion provides much more functionality and an improved customer experience for security operations center (SOC) and cloud operations teams.
Read More
September 22, 2022 in Blog

Security Scope and the Threat Continuum. What CISOs Need to Know.

Netography is architected to quickly replace the network-based security capabilities that atomization and encryption have eroded. And we can do it with a broader scope for more extensive coverage of the threat continuum.
Read More
September 14, 2022 in Blog

What Does East-West Mean in an Atomized Network?

The traditional view of east-west doesn’t really exist anymore. We can no longer point to a location and say that something exists in this physical space. We’re now dealing with a dynamic environment that is…
Read More
September 8, 2022 in Blog

Atomized Network is an “And” not an “Or”: Driving to Cloud Transformation

The Atomized Network is an “and,” not an “or”. As your environment morphs, Netography morphs with you to secure what your Atomized Network looks like now and how it will look over time.
Read More
August 25, 2022 in Blog

Netography’s Incremental Value to the Network Team

The Atomized Network creates new challenges for the security team, but also the network team. Netography delivers value to both.
Read More
August 17, 2022 in Blog

How FICO Gained Visibility and Control to Secure its Atomized Network

FICO achieved operational, technology, and business benefits from Netography Fusion. Read on to learn how.
Read More
August 3, 2022 in Blog

The Hidden Costs of Appliance-Based Models

Considering an appliance-based architecture to secure your atomized network? First, think about the massive hidden costs of lifecycle management, spec'ing and sizing, software upgrades, people hours, and so much more.
Read More
July 28, 2022 in Blog

Threat Detection for your Multi-Cloud Environment

Unless we think of the cloud as an extension of our on-prem environment and have complete network visibility across the entire enterprise footprint, we are destined for failure when it comes to protecting the entire…
Read More
July 20, 2022 in Blog

ICYMI: Top 5 Blogs on Securing the Atomized Network

We are in the middle of a doctrinal shift in the security industry that requires new technology innovation. These blogs provide an overview.
Read More
July 14, 2022 in Blog

The Compliance Advantage: Metadata vs. DPI

The way to narrow the scope of compliance and at the same time mitigate risk is to either reduce the need to have access to sensitive data or use tools that don’t rely on DPI…
Read More
July 12, 2022 in Blog

Netography at Black Hat: Adapt to Change and Discover Your Atomized Network

How can you gain visibility into the Atomized Network? By adapting and adjusting to change by moving to solutions that give you visibility and control. Learn more by visiting Netography at Black Hat in Las…
Read More
June 30, 2022 in Blog

Modern security interoperability for the Atomized Network

When security interoperability is designed based on outcomes, enterprises benefit from an integration strategy that spans the full gamut from detection to remediation—with humans in-the-loop, or not—with precision and speed.
Read More
June 22, 2022 in Blog

All security innovation comes from startups

Security innovation comes from startups full of passionate people instead of old companies focused on optimizing portfolios of acquired startups, leading to offerings that feel like “20 startups in a trench coat.”
Read More
June 16, 2022 in Blog

Live off the land: The fundamental rethink for Zero Trust SecOps

With network metadata, enterprises can address one of their highest security priorities this year and move to Zero Trust with confidence.
Read More
June 1, 2022 in Blog

The future of security solutions is cloud-native

A cloud-native platform means security leaders can get ahead of advancing complexity to embrace the flexibility of the cloud with confidence and—best of all—do so on their terms.
Read More
May 24, 2022 in Blog

Moving to the cloud while strengthening defense

Gain complete visibility and apply a single, consistent layer of detection, response, and remediation across all your environments. You can strengthen security and move to the cloud, and you can start now.
Read More
May 19, 2022 in Blog

Zero Trust: Faustian bargain?

With no hardware, no software, and nothing to install, you can quickly replace the network visibility you’re rapidly losing in a Zero Trust world and complement EDR with capabilities you’ve never had before to better…
Read More
May 10, 2022 in Blog

The rise of the Atomized Network and how to secure it

We closely examine the Atomized Network, why it is difficult to defend, the limitations of the most prevalent solutions, and the need to secure it.
Read More
May 4, 2022 in Blog

Cloud security: Unlocking the power of network metadata

Netography grew up developing technology that allows companies to take advantage of the cloud as a great enabler without struggling to defend it.
Read More
April 27, 2022 in Blog

Threat detection with network metadata vs. DPI

Traditional DPI-based network threat detection appliances will have a role to play in your technology stack for a while. But there’s no doubt their usefulness is diminishing.
Read More
April 20, 2022 in Blog

In an EDR-focused world, you still need network visibility

EDR is a powerful tool, but it leaves cracks in your security stack. You need an agentless and passive detection approach for more comprehensive protection. Netography fills the gaps, complementing EDR to provide complete coverage…
Read More
April 14, 2022 in Blog

Complexity is the enemy of security, so live off the land

While block listing and allow listing will likely continue to serve a function in the security team’s toolbox, you also need a way to see the nuances of gray to truly achieve securing your Atomized…
Read More
April 6, 2022 in Blog

Reality is grey, not block or allow

While block listing and allow listing will likely continue to serve a function in the security team’s toolbox, you also need a way to see the nuances of gray to truly achieve securing your Atomized…
Read More
April 1, 2022 in Blog

Barrett Lyon, Netography: “network metadata is abundant and badly underutilized in most IT environments”

With the pandemic unexpectedly locking everyone at home and closing offices, most organizations made a sudden and rapid switch to cyberspace. This resulted in companies getting many different applications that were never meant to work…
Read More
March 31, 2022 in Blog

In the Atomized Network appliances are a dead end. Think outside the box.

Conventional threat detection and application-aware security on the network has historically required DPI appliances that were deployed in the middle of network traffic. In the Atomized Network, there is no middle anymore.
Read More
March 29, 2022 in Blog

Threat Detection with Zero Deployment

One beautiful part about the Netography Fusion platform is our Threat Research Team’s ability to instantly roll out new threat detection models at any time to detect and provide visibility into threats on customer networks.…
Read More
March 24, 2022 in Blog

Megatrends and the doctrinal shift in enterprise security

We’ve seen an interesting progression over the last decade in how we think about the cloud and security. As organizations started moving to the cloud, it became apparent that compared to what was possible in…
Read More
March 15, 2022 in Blog

Protecting the Atomized Network: What CISOs Need to Know

We know that the cybersecurity technology landscape can be confusing, particularly when it comes to defending today’s scattered and fluid computing environments. And all the acronyms don’t help: CSPM, CNAPP, EDR, EPP, NDR…It seems the…
Read More
August 27, 2021 in Blog

Comparing Cloud Provider Flow Logs

On your marks, get set, Bake! The Netography team has been recently watching "The Great British Baking Show," and admittedly, we're ALL hooked. Many of us honed new skills in the kitchen around baking over…
Read More
August 4, 2021 in Blog

The 8 Must Haves for Network Detection & Response

Spending in the cybersecurity marketplace continues to grow at a fast pace. Cloud security spending will reach $12.6B on security tools by 2023. It’s no surprise there are a massive amount of solutions that claim…
Read More
June 23, 2021 in Blog

Cryptojacking – The Latest Threat to Keep You Up At Night

If the current threat landscape wasn’t enough to keep you up at night, you can now add Cryptojacking attacks to the list. According to NTT’s 2021 Global Threat Intelligence Report, 41% of all malware detected…
Read More
March 25, 2021 in Blog

How to Configure RTBH with Netography

DDoS Attacks continued to grow in 2020 and beyond as COVID-19 drove organizations to shift everything to the web from learning to healthcare. As a result of this tumultuous year, attacks have grown in size…
Read More
December 16, 2020 in Blog

Stop Unauthorized Access to Your Network

With the recent reports of one of the largest and most sophisticated data breaches ever, it's no surprise this news has sent shock waves around the entire cybersecurity community. Given the size of this latest…
Read More