Blog

See Us at IANS Boston Information Security Conference

Attend Patrick Crowley's Discussions About Dynamic Endpoint Modeling

Observable Networks will be in Boston next week at the IANS Boston Information Security Forum. We hope you will stop by and visit us.

Continue Reading

Must-Have Security Tools and the Risks You Need to Know: Part 1

A closer look at ways common security tools could leave your network vulnerable.

The must-have security tools come with must-know security risks, and here we take the time to understand what those risks are and how to address them. In this two-part blog series, we’ll help you understand how you can be better prepared to maintain essential tools.

Continue Reading

Man in the Middle: Smart Security Decision or Vulnerable Approach?

Should you exert more effort to monitor your network after investing in technology to monitor your network?

You invest heavily in technology designed to encrypt data and protect your network. Yet some security solutions require you to decrypt data, or “man in the middle” yourself, at critical transfer points, adding complexity to your infrastructure and leaving you with new vulnerabilities despite your investment. Find out why these third-party solutions are a bad investment compared to endpoint modeling.

Continue Reading

Financial Services Companies Seek to Add Security Even as Posture Improves

A new case study highlights how a financial services company partnered with Observable Networks to drastically improve security.

Today, the financial markets are a favorite target for cyber attackers. From banks to credit card companies, stock brokerages to insurance companies, financial services organizations must do all they can to improve network security. See how Dynamic Endpoint Modeling is the answer.

Continue Reading

See us at the New York City Tech-Security Conference

Attend Patrick Crowley's Presentation Introducing Endpoint Modeling

Continue Reading

How to Better Identify Threats Within Your Public Cloud Network

Can you decipher endpoint activity on your cloud network?

Dynamic Endpoint Modeling helps you see, and understand, how devices are interacting with your public cloud infrastructure.

Continue Reading