Authors

Bryan Doerr

Chief Executive Officer

Bryan Doerr

Bryan Doerr has served as Observable Network's chief executive officer since 2013. Bryan is responsible for developing the company's innovative technology and for transforming Observable into an industry-leading company. Bryan has extensive industry experience in corporate research, product design, IT management, and executive management.

Blog posts by Bryan Doerr

Cisco Today Announces Intention to Acquire Observable Networks

Today, Cisco announced their intention to acquire Observable Networks.  We view this as both a validation of our company’s realization of a big idea and an opportunity to take this big idea onto a bigger stage. We’re very excited about next steps with Cisco, the Security Business Unit and the Stealthwatch Product Team...

Continue Reading

Observable Networks Looks Back at 2016 and Forward to 2017

Because we focus on advanced threat detection, around this time of year, I take in what happened in terms of network security during the past year and look ahead into the next year. Below are some of my observations.

Continue Reading

Hospital Networks and the Internet of Things

A recent USA TODAY article demonstrated how the medical Internet of Things (IoT) trend subjects hospital networks to increased network security risk.

Continue Reading

Endpoint Modeling and the NIST Cybersecurity Framework

The NIST Cybersecurity Framework does not refer to the word “signature,” demonstrating that it forgoes the entire signature-detection mandate. It also makes a case for gaining a better understanding of network activity and data flows. This is exactly the advantage that endpoint modeling provides.

Continue Reading

Endpoint Modeling: A New Approach to OT Network Security

OT network security is vulnerable in companies using standard DPI methods. Read why endpoint modeling is a better approach to your OT network security.

Continue Reading

Overcome IDS Flaws with Endpoint Modeling

Why intrusion detection systems do not work

Read about IDS and the two most common challenges that come with todays network security products. Also learn how to overcome these challenges.

Continue Reading