Select Categories

Modern DDoS defenses for National Networks – combining network visibility in Design and Implementation

By: Zeev Draer May 16, 2022

Distributed Denial-of-service (DDoS) attacks continue to accelerate and evolve into highly sophisticated vectors, threatening any digitally connected entities and services; specifically, the entry of connectivity to the global /local communications networks [which start with the

Empowering data privacy with the right network visibility solution

By: Zeev Draer January 27, 2022

In the digital transformation age, the cybersecurity industry received tremendous spotlight with respect to the pervasive capability of the IT domain to have full access (literally) to any digital asset, regardless of geographical distances and physical barriers. The real paradox exists between how much power IT teams can have to secure and maintain the entire footprint of the digital assets, while still preserving and complying with data privacy regulations. Some will claim that such powerfu...

Resolving the Packet Duplication Challenges

By: André Vink November 16, 2021

Seamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation of network threat detection and remediation. Regrettably, packet duplication has commonly been an undesirable side-effect of network traffic monitoring. Packet duplication produces redundant information in the monitoring tra...

PCI Compliance – What is it, why is it needed and who needs to comply?

By: Stuart Howe February 25, 2021

Payment processing security has, in technology terms a long history. Toward the end of 2004, five major credit card companies (American Express, Discovery Financial Services, JCB International, MasterCard, and Visa Inc) collaborated together to create the Payment Card Industry Data Security Standard (PCI DSS) and all organisations dealing with payment processing regardless of size or number of transactions have a contractually obligation to meet this standard. PC...

A brand-new year and cybersecurity defense thoughts

By: Raymond Tan February 11, 2021

It is a brand-new year, and by now you would probably hear from someone that they were busy or sharing about their unique virtual SKO experience.

SecOps Blind sighted!?

By: André Vink November 24, 2020

Privacy, both in the physical and online world, is one of the things most people value dearly. With the inevitable shift from physical locations and facilities offered by financial institutions, retail stores and government to an online environment, secure communications and transactions are becoming indispensable.

L7 Defense and Niagara Networks Close the API Security Gap

By: Niagara Networks July 22, 2020

Written by Zeev Draer VP of Marketing Niagara Networks and Ilan Paretsky CMO L7 Defense  If there’s one need more critical than others in today’s delicate cyber security landscape, it’s the critical linkage between the network security and applicative security. Take Niagara Networks and L7 Defense for example (I know - we’re not exactly objective here, but still) – a network and security visibility pioneer and an API security disruptive inn...

Niagara Networks Majestics Partner Program

By: Scott Thompson June 16, 2020

Recently, Niagara Networks formally announced its Majestics Partner Program in North America targeting the regional VAR, system integrator, consultant, and MSP. The network visibility market is primed for an alternative solution th...

Network Flexibility and Agility: Values for Astronomical Success

Caltech has an amazing history of scientific discoveries and breakthroughs. For many people Caltech is synonymous with “rocket science.” The institute was the first to discover gravitational waves and the existence of a ninth planet. Caltech discovered the largest and farthest reservoir of water ever detected in the universe, some 30 billion trillion miles away in a quasar. The list is long and ever growing.

Connecting the Dots of Visibility in Cyberwarfare of Today

By: Zeev Draer March 25, 2020

Nowadays, defending against asymmetrical cyber warfare using the old paradigm of focusing on North-South traffic is no longer valid. Attackers have discipline, creativity and more aggressive plans as the attack surface continues to expand with more digital assets inflating the value. Most cyber attacks and defence will start from a North-South direction, but once inside the network, an attacker will spread horizontally using East-West tactics. This is the precise moment when a combina...