New & Notable
Network threat detection News
December 26, 2019
Siemplify aims to become the security equivalent of Salesforce. Chief strategy officer Nimmy Reichenberg discusses the company's plans for 2020 and the obstacles it faces.
November 21, 2019
IBM Security is shifting its strategy with a new Cloud Pak designed specifically to unify data from multiple security tools and vendors through accessing federated data.
October 30, 2019
Mission Control is intended to unify Splunk Enterprise Security, Splunk Phantom and Splunk User Behavior Analytics into the Splunk Security Operations Suite.
October 01, 2019
The new offering is built on Sophos' endpoint security platform Intercept X Advanced, with capabilities supported by the company's recent acquisition of Rook Security and DarkBytes.
Network threat detection Get Started
Bring yourself up to speed with our introductory content
The role of CISO in network security goes beyond risk management. It also requires understanding compliance regulations and business needs, as well as the ability to communicate security policies to nontechnical employees. Continue Reading
Building a security operations center means understanding the key features you need to ensure your network remains protected against threats. Continue Reading
Companies have used traffic data analytics to improve bandwidth and network performance. Now, though, a new class of tools taps network data to improve security. Continue Reading
Evaluate Network threat detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
AI and machine learning in cybersecurity are not so much useful to security teams today as they are necessary. Examine cybersecurity automation trends and benefits. Continue Reading
Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective enterprise security. Continue Reading
Cyberthreats loom large in this modern IT environment. Explore the six most common roles of AI in cybersecurity and the products synthesizing them. Continue Reading
Manage Network threat detection
Learn to apply best practices and optimize your operations.
Effective network monitoring is an ongoing process that requires constant vigilance by IT groups. This step-by-step plan can fine-tune network monitoring strategies. Continue Reading
An effective security operations center framework includes more than just monitoring and analysis. AI and machine learning can also play a role. Continue Reading
The popular port scan is a hacking tool that enables attackers to gather information about how corporate networks operate. Learn how to detect and prevent port scanning attacks. Continue Reading
Problem Solve Network threat detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Security cannot be an afterthought in internet-connected industrial control systems. IEEE member Kayne McGladrey offers best practices to stay safe in a connected world. Continue Reading
New, sophisticated technology is available to help infosec pros find IT infrastructure vulnerabilities. Automated pen testing and outsourcing threat intelligence services can help. Continue Reading
Network traffic analysis, network detection and response -- whichever term you prefer, the technology is critical to detecting new breeds of low-and-slow threats. Continue Reading