SOC teams always feel like they are having to play catch-up on detections, because without the ability to add criticality and context to devices, all devices are considered equal- causing wasted time searching for additional…
The Netography Threat Research Team has updated several new detection models to improve efficacy for customers, as well as NDMs for post compromise to use generated intelligence and to look for activity on high port…
The Netography Threat Research Team has released its latest updates to monitor outbound traffic for the allowed usage of cleartext protocols. There are also new alerts for post compromise to monitor internal IP actions for…
“The network is slow”. Years ago, a network operations manager would have relied on packet captures to solve this, but now networks are dynamic, encrypted, ephemeral, and diverse and require new tools to gain a…
Netography will be at RSA Conference at Booth #4116 in the Moscone South Corridor, where you can meet with the Netography team of experts who can show you our cloud-native Netography Fusion platform and how…
The Netography Threat Research Team has released its latest detection model updates to include port scanning internal resources for the detection of vulnerabilities, abuse, or attacks on customer networks, as well as new vulnerabilities in…
Organizations unsuccessfully rely on solutions to block or monitor social media use to prevent risk, privacy regulations, or allowing attackers into the network but Netography’s social media dashboards help enforce policies.
The Netography Threat Research Team has released its latest detection model updates that include the detection of a wide range of global chat and messaging applications on customer networks.
Modern networks are challenged by being atomized and diverse, with security teams trying to make cohesive sense out of multiple different security technologies using different languages. Martin Roesch calls this the “Tower of Babel” problem.
The Netography Threat Research Team has released its latest detection model updates of several optimizations of existing detections to reduce noise and provide more accurate alerts.
Written by security professionals for security professionals, our new Buyer’s Guide helps you demystify how network security has evolved and what you need to look for in categories of solutions and capabilities.