Blog

Observable Networks Looks Back at 2016 and Forward to 2017

Because we focus on advanced threat detection, around this time of year, I take in what happened in terms of network security during the past year and look ahead into the next year. Below are some of my observations.

Continue Reading

Cybersecurity With Suspicion: Scoping Out Insider Threats

To combat insider threats, customers of Amazon Web Service, Azure and the other public cloud vendors need cybersecurity that autonomously recognizes unusual behavior.

Continue Reading

See Us at IANS Boston Information Security Conference

Attend Patrick Crowley's Discussions About Dynamic Endpoint Modeling

Observable Networks will be in Boston next week at the IANS Boston Information Security Forum. We hope you will stop by and visit us.

Continue Reading

Must-Have Security Tools and the Risks You Need to Know: Part 1

A closer look at ways common security tools could leave your network vulnerable.

The must-have security tools come with must-know security risks, and here we take the time to understand what those risks are and how to address them. In this two-part blog series, we’ll help you understand how you can be better prepared to maintain essential tools.

Continue Reading

Man in the Middle: Smart Security Decision or Vulnerable Approach?

Should you exert more effort to monitor your network after investing in technology to monitor your network?

You invest heavily in technology designed to encrypt data and protect your network. Yet some security solutions require you to decrypt data, or “man in the middle” yourself, at critical transfer points, adding complexity to your infrastructure and leaving you with new vulnerabilities despite your investment. Find out why these third-party solutions are a bad investment compared to endpoint modeling.

Continue Reading

Financial Services Companies Seek to Add Security Even as Posture Improves

A new case study highlights how a financial services company partnered with Observable Networks to drastically improve security.

Today, the financial markets are a favorite target for cyber attackers. From banks to credit card companies, stock brokerages to insurance companies, financial services organizations must do all they can to improve network security. See how Dynamic Endpoint Modeling is the answer.

Continue Reading

See us at the New York City Tech-Security Conference

Attend Patrick Crowley's Presentation Introducing Endpoint Modeling

Continue Reading

How to Better Identify Threats Within Your Public Cloud Network

Can you decipher endpoint activity on your cloud network?

Dynamic Endpoint Modeling helps you see, and understand, how devices are interacting with your public cloud infrastructure.

Continue Reading

Too Much of a Bad Thing?

Security solutions are generating a volume of alerts that threaten to overwhelm IT and security professionals. We look at an example where “less is more.”

Spurred by the rise in data breaches, IT and security professionals have embraced a wide assortment of new tools designed to detect threats to their IT systems and data. Now, all of those tools seem to be yelling “Alert!” with such high frequency that security analysts simply can’t keep up. As a consequence, analysts become “detuned” to certain alerts and entire classes of alerts. This leads to security blind spots.  Observable’s Dynamic Endpoint Modeling offers a sensible alternative. 

Continue Reading

Managing Amazon Inspector for More Secure EC2 Environments

Learn more about Observable service’s integration with Amazon Inspector, a security tool for EC2 instances. Inspector produces “assessments” about the security state of EC2 instances. From the Observable web portal you can launch new assessments, schedule recurring assessments, get notified about high-severity findings, and use findings in conjunction with network flow data to help resolve alerts.

Continue Reading