New & Notable
Network threat detection News
October 01, 2019
The new offering is built on Sophos' endpoint security platform Intercept X Advanced, with capabilities supported by the company's recent acquisition of Rook Security and DarkBytes.
September 20, 2019
Security vendor RiskIQ discovered several old Magecart domains that had been sinkholed were re-registered under new owners and are now engaged in fraudulent advertising activity.
September 05, 2019
The new feature is meant to enable companies to identify attackers faster. Other updates to the security system include extending cloud capabilities to Amazon Web Services.
August 26, 2019
Puppet Remediate is a vulnerability remediation product that shares data between security and IT ops, provides risk-based prioritization and offers agentless remediation.
Network threat detection Get Started
Bring yourself up to speed with our introductory content
Companies have used traffic data analytics to improve bandwidth and network performance. Now, though, a new class of tools taps network data to improve security. Continue Reading
Gartner just produced its first-ever guide to network traffic analytics security tools. Learn how the analysis of network traffic is broadening to include network security. Continue Reading
Simulating an attack against your network is one of the best ways to remediate security holes before the bad guys find them. Here, learn penetration testing basics and how it can help keep your enterprise safe. Continue Reading
Evaluate Network threat detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As cloud use increases, many enterprises outsource some security operations center functions. Evaluate if SOCaaS is the best model for your enterprise. Continue Reading
Enterprises with the resources to deploy traffic mirroring are gaining security benefits. Frank Siemons explains how traffic mirroring has adapted to new and evolving cyber-risks. Continue Reading
Finding the best email security product is vital to protect companies from cyberattacks. Here's a look at the current market leaders. Continue Reading
Manage Network threat detection
Learn to apply best practices and optimize your operations.
Virtual networks add a layer of complexity to the real networks below them. Follow these three virtual network security measures to prevent complexity from creating issues. Continue Reading
Gaining visibility into the network has never been easy; technology like cloud and IoT makes it even tougher. Learn how to meet such challenges and keep network traffic flowing. Continue Reading
Compared to security orchestration, automation and response (SOAR) software, SIEM systems are dated. Expert Andrew Froehlich explains how SIEM needs to adapt to keep up. Continue Reading
Problem Solve Network threat detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend against such attacks. Continue Reading
Learn how to use the Wireshark packet analyzer to monitor network traffic, as well as how to use the Wireshark packet sniffer for network traffic analysis and inspection. Continue Reading
The workloads of network teams have evolved from their original objectives because of network security threats. Yet teams are still expected to maintain their initial goals. Continue Reading