Why Our Partnership with Options Is Good News for Financial Services

Details on Observable’s recent partnership with Options.

A new partnership between Observable Networks and Options promises to deliver more modern security capabilities and improved services to financial services companies. Find out why our combined strengths will provide better protection to financial organizations.

Continue Reading

The Not-So-Hidden Risk Behind the Apple Encryption Controversy

If Apple cooperates with FBI, who will watch the watchers?

This article offers our point of view on the controversy surrounding the FBI’s request that Apple create an unencrypted version of the iPhone operating system.

Continue Reading

What Does it Take to Keep the Nation’s Top Hacker Out of Your Network?

Dynamic Endpoint Modeling is exactly the solution the NSA recommends to thwart hackers.

In a recent presentation, the National Security Agency’s top hacker outlined a number of best practices for keeping his team – or anyone else – out of your network. Most critical: a solution that can provide complete visibility into network traffic and provide real-time alerts in response to any anomalies. A solution just like Dynamic Endpoint Modeling.

Continue Reading

A New Ovum Report Recommends Dynamic Endpoint Modeling

Dynamic Endpoint Modeling gets a gold star from analyst firm Ovum.

Ovum, a trusted IT analyst, recently published a report that details the many compelling reasons why any organization should consider Dynamic Endpoint Modeling as an additional security component. This article offers highlights and lets you download the report itself.

Continue Reading

Firewall Hole Punching: Known, Unknown, and Unexpected Risks

Many companies choose to punch a hole in their firewall to connect applications or systems – even though this presents a security risk.

IT often chooses to punch holes in firewalls, yet doing so can present security risks. This article looks at ways to protect yourself when hole punching is required and how to prepare for unexpected vulnerabilities.

Continue Reading

Is Anyone Safe? Teen Hacks Top U.S. Intelligence Agencies.

Phishing, password guessing, and other attacks are now affecting top businesses and government offices – apparently no one is safe.

A known hacker has now accessed phone records and other digital data to potentially track James Clapper, the U.S. Director of National Intelligence. This article takes a closer look at exactly what happened.

Continue Reading

Endpoint Modeling Helps Veterans United Home Loans Safeguard Sensitive Customer Data

Observable Networks’ Dynamic Endpoint Modeling solution gave Veterans United a better way to monitor network security – and security peace of mind.

A new case study shows how Veterans United Home Loans deployed Dynamic Endpoint Modeling to improve security and protect confidential information. This blog takes a closer look and provides download instructions to access the full case study.

Continue Reading

Where Will the Top 2016 Security Vulnerabilities Come From?

What will be the next big IT security threat? While we can't predict that with certainty, we can predict where your network might be vulnerable this year.

Wondering what’s in store for the security industry in 2016? Find out why we believe more vulnerabilities will be showing up in software products this year, including the very products designed to protect us from those threats.

Continue Reading

3 Signs Your IT Security Strategy Needs Updating in 2016

Is Your Security Stack Effective? 3 Signs Your IT Security Stack Needs Your Attention Now.

Do you know which signs indicate that your security stack is falling short? From your firewall to antivirus to security audits and malware-removal software, you should know the 3 key signs that highlight shortcomings in traditional security solutions … and what you need to do to take action.

Continue Reading

5 Flawed IT Security Tools Still Widely Used in 2016

It’s 2016 and 5 of the most commonly used IT security tools have significant flaws that are leaving companies unprotected. How will those gaps be filled?

Every year, we see the same familiar components of the conventional security stack aimed at safeguarding IT systems and data. But it’s becoming clear that these tools are falling behind when it comes to protecting against data breaches. Is 2016 when we start to see real change? We take a look at the gaps, and what can help fill them.

Continue Reading