Interactive Remediation - an emerging, real-time, capability for cybersecurity and network teams

Posted by MantisNet on Apr 1, 2019 7:00:00 AM

Today we announce the publication of our Special Report: Reduce Risk with Real-time Interactive Remediation of Network Traffic. It contains a discussion and explanation of the emerging capabilities of technologies to enable real-time decisions based on live / streaming network traffic data to reduce cybersecurity and operational risk.

Read More

Tags: cyber security, Data-In-Motion, mantis

The Ultimate Cyber Security Strategy: Is Data-in-Motion The Answer?

Posted by MantisNet on Jul 25, 2018 4:02:42 PM

Before we can address the optimum method for responding to the continuously evolving cyber threat landscape, we need to understand the sources and types of data available from which we can understand and make decisions about the health and security of our systems. 

Read More

Tags: cyber security, Real-Time Monitoring, Data-at-Rest, Data-In-Motion, mantis

Cyber Security Strategies that Make Data-at-Rest Obsolete

Posted by MantisNet on May 22, 2018 4:06:43 PM

The world of cyber security is complex and misunderstood by a majority of the public. Even in IT, few people understand the complexities of a sophisticated cyber attack. It's this lack of understanding and the low number of experts in the field that give cyber attackers an advantage. 

Read More

Tags: cyber security, Data-at-Rest

The Latest Verizon Data Breach Report: Your Data is Gone Within Minutes

Posted by MantisNet on Apr 27, 2018 2:02:51 PM

Verizon released its latest Data Breach Investigation Report (DBIR) highlighting the latest trends in malware and cyber crime, covering 53,000 incidents and 2,216 confirmed breaches. The report reveals that botnets are the most widespread, dangerous attacks to date. The number of botnet attacks reported was so numerous that all 43,000 breaches (mainly on financial data) were excluded from overall statistics and given a separate section of its own. With botnet breaches on the rise, Verizon's report confirms that monitoring network traffic is more important than ever.

Read More

Tags: cyber security, Real-Time Monitoring

Identify and Defend Against Credential Stuffing and ATO Attacks

Posted by MantisNet on Mar 26, 2018 8:07:42 PM
Cyber-crime is no longer a single attacker hacking away at your defenses. With automated credential stealing and account takeover tools, an attacker can send armies of bots to steal valuable information from thousands of victims and make hundreds of thousands of financial transactions.
Read More

Tags: cyber security, Account Takeover, ATO Attacks

Network Monitoring Step 2: The Next-Generation of Packet Brokers

Posted by MantisNet on Nov 9, 2017 9:40:10 AM
A new class of highly intelligent Virtual Switches and Next-Generation Packet Brokers (NPB) is on the rise.

Cloud computing and software-defined networking (SDN) have made development and operations teams far more aware of the importance of their networking infrastructure than ever before. In the age of DevOps, private, hybrid, and public cloud computing - the network is the fabric that holds the compute infrastructure together.

Read More

Tags: network engineering, network preformance, cyber security

Network Monitoring Step 1: SPAN Ports vs. TAPs

Posted by MantisNet on Oct 4, 2017 7:17:07 PM
While deploying network monitoring tools, IT managers are often faced with questions, such as: "Can we do this and still ensure that we aren't impacting the production network?" or "Can I make sure that I can see 100% of network traffic?" or "What is the best way to get data into my monitoring and test tools?" 
Read More

Tags: network engineering, test/lab automation, network preformance, cyber security, IT operations