Palo Alto Networks' product portfolio is paying dividends as customers look to reduce their vendor footprint, says CEO Nikesh Arora. He says despite pressures in the global economy, enterprises aren't currently stressing about their IT budgets.
Check Point is aggressively expanding its salesforce and standing up "rockets" focused on emerging technology areas to land more customer deals outside network security. The company will couple 25% growth in its salesforce with dedicated investments around cloud security, email security and MDR.
When it comes to advanced threat response, 42% of financial institutions say their current abilities are average. Only 35% say automation currently plays a strong role. Josh Zelonis of Palo Alto Networks and Sid Srivastava of Accenture analyze the State of Security Automation in Financial Services.
Are you interested in exploring how to defend against ransomware and supply chain attacks, or securing your public cloud? Then register now to experience hands on how Vectra sees threats and stops breaches.
Are you ready to supercharge your security operations using orchestration and automation? A Security Orchestration, Automation and Response (SOAR) tool can automate monotonous security tasks, help you respond to security incidents faster, and increase team productivity and efficiency.
Gartner’s latest Market...
With cyberattacks, such as ransomware, phishing and malware on the rise, network security has never been more critical. Network Detection and Response (NDR) offers real-time visibility so that you can detect and respond earlier and more effectively to attacks traversing your network.
During this session, LogRhythm...
Change is afoot at Trellix, which is the new name of the cybersecurity software business formed from the merger of McAfee Enterprise and FireEye. CEO Bryan Palma says the extended detection and response - aka XDR - software imperative for his customers is to do more, but with fewer suppliers and management overhead.
Network compromise drives big business on the dark web. Cybercriminals are actively buying and selling unauthorized network access in a variety of underground forums.
This specific variety of criminal market offerings is less well known than others, but the extended cybercrime activity it enables is impacting...
The network detection and response market is "relatively unchallenged at this point by other markets," and detection is the most important use case, says Nat Smith of Gartner, who shares key findings from the company's report titled Emerging Trends: Top Use Cases for Network Detection and Response.
Cyber attacks happen — that’s a static fact of today’s cyber-fueled world. What isn’t static is how and where these attacks happen. Opportunities for attackers abound as networks grow more complex and orgs migrate (or come to life) in the cloud. Today’s attackers can spend months hiding in an environment,...
If your solution is out at sea, it’s time to learn more about improving integration. Microsegmentation can allow security architects to divide data centers into unique security segments (as far down as individual workload levels) but requires integration.
Join us in this webinar where Illumio’s Field CTO...
Many organizations are relying on Managed Detection & Response (MDR) providers to make sure they’re able to respond to threats like ransomware as they emerge, without hiring any headcount.
With an expected shortage of 2.5 million cybersecurity professionals it’s become critical to dedicate resources to better...
Download this guide which highlights 10 tactical prescriptions when evaluating Managed Detection and Response (MDR) vendors for what a provider should be able to offer your business, and Rapid7's approach to each.
Enterprises are overwhelmed with security tools and the complexity they
create. Can automation knit them together to improve threat visibility
and accelerate response?
Download this whitepaper to learn more about:
WHY organizations have high expectations for automation – and why they need to
dial back or...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.