New & Notable
Real-time network monitoring and forensics News
February 06, 2020
Network security vendor Forescout Technologies was acquired for $1.9 billion by Advent International, a private equity firm looking to increase its cybersecurity investments.
September 05, 2019
The new feature is meant to enable companies to identify attackers faster. Other updates to the security system include extending cloud capabilities to Amazon Web Services.
August 14, 2019
Defending against the rising number and increasing sophistication of IoT botnet attacks isn't an easy task. Learn about the latest threats and the techniques to mitigate them.
March 21, 2018
SAP CSO Justin Somaini discusses how SAP uses machine learning for security tasks, like anomaly detection, and compares supervised and unsupervised algorithms.
Real-time network monitoring and forensics Get Started
Bring yourself up to speed with our introductory content
When those IT alerts pop up, the ops team needs to respond. Take steps to deal with the problems -- but also look out for possible sources of the trouble. Continue Reading
Show what you know about the topics covered in the May 2020 issue of Information Security magazine. If you get nine of 10 answers right, you'll also receive CPE credit! Continue Reading
Companies now face sophisticated enemies using AI and machine learning tools for their attacks. It's a world of new dangers for those defending network systems and data. Continue Reading
Evaluate Real-time network monitoring and forensics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Companies are forming formal partnerships between their network and security teams. While this collaboration reaps benefits, some significant roadblocks remain. Continue Reading
Cyberthreat intelligence is essential to understand common external-facing risks. Learn how to find the right threat intelligence feed and how the data can benefit cybersecurity. Continue Reading
Enterprises with the resources to deploy traffic mirroring are gaining security benefits. Frank Siemons explains how traffic mirroring has adapted to new and evolving cyber-risks. Continue Reading
Manage Real-time network monitoring and forensics
Learn to apply best practices and optimize your operations.
The cyber arms race is never-ending. Learn how to prevail over advanced attacks by putting the latest intelligent technology to service in your cybersecurity program. Continue Reading
Network traffic analysis best practices require network teams to work closely with security teams and constantly assess their tool sets, analysis processes and traffic patterns. Continue Reading
Beyond protecting enterprise databases from vulnerabilities, it is critical to improve and review their security on a regular basis. Learn more with these database security best practices. Continue Reading
Problem Solve Real-time network monitoring and forensics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Effective network monitoring is an ongoing process that requires constant vigilance by IT groups. This step-by-step plan can fine-tune network monitoring strategies. Continue Reading
The popular port scan is a hacking tool that enables attackers to gather information about how corporate networks operate. Learn how to detect and prevent port scanning attacks. Continue Reading
Network traffic analysis, network detection and response -- whichever term you prefer, the technology is critical to detecting new breeds of low-and-slow threats. Continue Reading