Blog

Three Tech Trends that Make Endpoint Modeling Essential

Three industry-wide trends are making endpoint modeling an essential complement to the traditional security stack. It’s time to plug the holes left open by conventional security solutions. Firewalls, antivirus, and malware removal are still necessary but not sufficient to keep IT systems and data secure.

Continue Reading

Amazon Web Services Demos Observable’s Dynamic Endpoint Modeling at re:Invent 2015

AWS recently featured Observable Networks and our Dynamic Endpoint Modeling solution in a presentation on using VPC flow logs to monitor endpoint behaviors. Learn more and view the presentation from AWS re:Invent now.

Continue Reading

Are Multi-function Devices a Security Risk in Your Workplace?

No doubt your employees enjoy the benefits of networked multi-function printers (MFPs). But has your organization considered how big a threat these devices could pose to your information security? Here’s a hint: It could be more of a risk than an employee’s laptop.

Continue Reading

A Closer Look at Observable Networks’ Sensor Appliance

In the interest of transparency, we've always published the source of ONA's IP traffic metadata collection software. To further that interest, we're now pleased to publish the source for all of the ONA's functions. You can review this code at the ONA's GitHub project page.

Continue Reading

Don’t Miss Our Upcoming Webinar: “Endpoint Modeling: A Critical New Component in Network Security”

Register now for our webinar recording, “Endpoint Modeling: A Critical New Component in Network Security.” Featuring Ichthys IT services, this webinar provides real-world insight into endpoint modeling and how this technology can identify and defeat advanced threats.

Continue Reading

Observable Launches AWS Network Monitoring

Observable’s Dynamic Endpoint Modeling solution can now use VPC Flow Logs to effectively monitor network activity across virtual servers on Amazon Web Services (AWS).

Continue Reading

Best Practices for Improving MSP Client Security

Owners of small and mid-sized businesses increasingly turn to managed service providers (MSPs) to protect their systems, and their customers, from data breaches. What should MSPs who want to seize this opportunity be doing?

Continue Reading