Category: Uncategorized

How to Use Identity, Behavior and Risk to Prevent Compromised Credentials

Identity, Behavior, and Risk. Identity, Behavior, and Risk. Almost like a mantra. Think about it for a few seconds. Identity,...
Read Now

What is UEBA and Why Does it Matter In Threat Detection? [Part 1 – Blog Series]

In the introduction to this blog series on "A Closer Look Inside UEBA: Top 5 FAQs", I discussed how many customers...
Read Now

Lack of User Behavior and Static Policies Limit Next Gen Firewall Threat Prevention

I recently was speaking with one of our customers and he said to me: "changing a rule on a Next-Generation...
Read Now