AWS CloudTrail, Amazon CloudWatch and VPC Flow Logs, Amazon Web Services (AWS) automatically indexes network metadata and Amazon Inspector is there to audit virtual server configurations and identify weak spots in applications. However, there are many cyber threats not detected by examining configuration vulnerabilities. Read on to learn about three cyber threats that AWS log data and tools don't show you.Continue Reading
This post will describe how to look at alerts from Observable for network scans, which tends to be harder to judge.
A new Observable whitepaper demonstrates how Amazon Web Services (AWS) provides security in the cloud while still highlighting the challenges that remain for Amazon, its partners, and their customers. This article examines the ways you can anticipate – and combat – the known and unknown threats to security in an AWS environment.Continue Reading
Observable’s Endpoint Modeling is good at monitoring the “Internet of Things” things. Not only workstations and servers, but printers, phones, cameras, sensors, or industrial devices, and others devices that are found on many networks. It’s possible to identify subtle changes in behavior (that might indicate a compromise) without producing lots of nuisance alerts.Continue Reading
We hope to see you at the Seattle Data Connectors Conference where we will be exhibiting. Stop by Patrick Crowley's discussion on how our advanced security solutions overcome the gaps traditional security tools like IDS/IPS and next-gen firewalls leave in the face of today’s threats.
Securing virtual private clouds becomes more critical every day. Observable Networks demonstrates its continuing commitment to that mission by achieving Advanced Technology Partner status in the Amazon Web Services Partner Network (APN).Continue Reading
Observable’s founder and CTO Patrick Crowley has written a provocative new whitepaper, which analyzes both the achievement of Amazon Web Services (AWS) in assuring security in the cloud, and the challenges that remain for Amazon, its partners, and their customers.Continue Reading
Observable detects all types of security-related issues, including multiple types of alerts in the “data loss prevention” category. These are aimed at identifying instances when a user (or an attacker) might have transferred files or data outside the local network without authorization. Read this post to learn more.Continue Reading
We hope to see you at the Pheonix Data Connectors Conference where we will be exhibiting. Stop by Patrick Crowley's discussion on how the evolving security landscape requires we re-examination tools traditionally used to protect our networks.Continue Reading
Learn what happens when Observable sends you an alert so you will be able to react to it properly. This post describes how to use the Observable web portal to research a set of suspicious connections.Continue Reading