Cloud networks contain valuable security information, but without a way to gather and analyze that data, you are missing out on a comprehensive view of what’s happening and what should never occur.
Read the recap of our online discussion with Jason Waits, CISO at Inductive Automation. He explains how his security team used the Netography Fusion® Network Defense Platform (NDP) to advance his network defenses beyond traditional…
Netography Fusion adds Microsoft Defender for Endpoint and Microsoft Defender XDR integrations, enabling customers with faster detection of and response to compromises with context from Microsoft-managed identities, email, endpoints, and cloud apps.
In his new blog, Martin Roesch explains why we all need to change our focus when we think about detections, and evolve from threat-centric to compromise-centric approaches.
This blog by Martin Roesch explains how Netography’s new approach of a frictionless network defense strategy was built on the concepts of frictionless deployment with no appliances, sensors, or agents, and our ecosystem of third-party…
In this new blog by By Dan Ramaswami he gives his recipe for an actionable alert using Netography to combine the ingredients of data and context from host, user, application, and governance and compliance information…
To respond to this threat, Netography has released a new Netography Detection Model (NDM), called “slpreflection”, which will detect floods of traffic originating from the SLP port (427).
Our webinar “Security Mavericks: Interpublic Group, FICO, and Mercury” is available to watch on-demand or read the recap, where Troy Wilkinson, Interpublic Group, Shannon Ryan, FICO, and Branden Wagner, Mercury, talked about the surprises and…
Event sources continue to grow, creating alert fatigue from all the noise that security teams have to analyze to determine if there is a compromise, and context is needed to manage this chaos.
Active exploitation of this vulnerability installs a malware implant on affected devices allowing attackers to execute arbitrary commands with full privileges. Unlike single-event-based detections, Netography detection models only trigger after observing follow-on exploitation behavior of…
Martin Roesch explains the situations where DPI is still useful, where it is costly, and where it is ineffective, and how Netography Fusion works as a 100% SaaS platform with DPI to achieve more effective…