Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

12 Big New Network And Endpoint Security Tools From The Black Hat 2019 Conference

Here's a look at 12 products released during the Black Hat 2019 conference that turn network assets into security devices, redirect attempted endpoint access into deception environments, and use machine-learning algorithms on network flows.

Back 1 ... 2   3   4   5   6   ... 13 Next
photo

Netography Distributed IPS

Netography Distributed IPS (Intrusion Prevention System) addresses the disappearing network perimeter by turning any network asset into a security device. Its use of cloud-native infrastructure and distributed telemetry gathering allows workers to discover, investigate and remedy modern threats with speed and autonomy.

The product continuously and automatically detects and remediates malicious traffic, and works by ingesting all common flow data via a proprietary cloud flow collector. The flows are monitored by a host of proprietary algorithms, which can trigger plugins capable of doing anything from re-routing networks to defending global infrastructure.

Unlike on-premises IPS devices that lack unlimited storage and compute capacity, Netography Distributed IPS can discover extremely complex security events that typically go unseen. The tool is complementary to existing security deployments, and enables teams to better control devices and reduce threats.

 
 
Back 1 ... 2   3   4   5   6   ... 13 Next

sponsored resources