Company Blog

Anonymous's picture
Written by
Alan Hall, Director, Product Marketing for Security Analytics

For security professionals both old and new, Black Hat is a highly anticipated event. New research, solutions, techniques and vulnerabilities will all be making headlines throughout the week as cybersecurity professionals from around the world flock to Las Vegas.

Anonymous's picture
Written by
Alan Hall, Director, Product Marketing for Security Analytics

Enhancing Network Forensics and Incident Response with Automated Anomaly Detection

There’s simply too much going on across today's IT networks for information security and incident response teams to manually parse – a month, a week or even a day of complete network traffic can prove impossible to manually analyze.

Peter Doggart's picture
Written by
Peter Doggart

Since the launch of the Blue Coat Encrypted Traffic Management ecosystem program (ETM Ready) in March 2015, we have successfully collaborated with security vendors of all sizes and in all market categories to create a workable solution to the challenge of managing the increasing usage of SSL/TLS traffic in enterprise networks that, when not effectively addressed, causes a huge blind spot for the security infrastructure and dramatically increases risk of advanced threats and data exfiltration.

Brian Kenyon's picture
Written by
Brian Kenyon

This is the third and final post in our series about the key trends that are exerting the greatest pressure on enterprise security defenses today. In the first post we looked at the evolving endpoint and the expanding perimeter; the second post examined the need for encrypted traffic visibility and the move to cloud-based Office 365.

Brian Kenyon's picture
Written by
Brian Kenyon

This is the second in a series of three posts about the key trends that are having the largest impact on enterprise security defenses today. In the first post we looked at the evolving endpoint and the expanding perimeter; let’s now examine two additional trends: encrypted traffic visibility and Office 365 adoption.

Brian Kenyon's picture
Written by
Brian Kenyon

Last year 76% of enterprises were affected by a successful cyberattack, according to the newly released 2016 Cyberthreat Defense Report from CyberEdge Group. This happened despite the fact that 85% of companies are spending at least 5% of their entire IT budgets on security, and an astonishing 30% are spending at least 16% of their IT budget on security, according to the same report.