Network Monitoring Just Became More Secure, Optimized, and Efficient

The entire Motadata team feels elated in informing you that Motadata Upgrade Release 7.6.400 has been rolled out and is available for installation from October 2020. We understand that many of our customers are already generating value, cost-efficiencies, and competitive edge with their existing Motadata version. But the update has been engineered to augment the entire platform’s value-proposition and making it an obvious choice for an upgrade.


IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism in AD to register a rogue domain controller in order to inject backdoor changes to an AD domain.


Are Network Blind Spots Endangering Your Business?

Network blind spots are the things you can’t see and don’t know about. They’re dangerous. Just like the blind spots on your car, network blind spots can set you up for deadly crashes. Problems will seem to “come out of nowhere” and hit unexpectedly. Network blind spots create all kinds of serious problems. A major network crash is one. But other problems can really pile up too.


Data World Highlights: T-Mobile Netherlands, Anodot Discuss the Future of Network Monitoring

During the Data World event, Erwin Halmans, Project Manager of Data-Driven Network Operations & Assurance at T-Mobile Netherlands, Shounit Lax-Swisa, CEO of Company Booster, and Anodot Chief Data Scientist and Co-Founder Ira Cohen got together to discuss the future of network monitoring.


The Importance of Tying Monitoring to Business KPIs to Improve Customer Experience

On par with the bottom-line profits generated by a business, customer experience is one of the top goals of any organization. In fact, a great customer experience is what enables better and more sustainable revenue growth. While business leaders and CXOs are keenly aware of its importance, Ops teams can lose sight of the importance of customer experience.


Postapocalyptic Networks

Just imagine the current situation continues well into the foreseeable future—let’s merge reality with a little fiction. The apocalypse is over, but life has changed permanently. This means we’re going to wear masks in public transport, shops, and restaurants and follow sports events on television instead of in the stadium. But hey, beer is much cheaper at home anyway. Office jobs are outsourced, but not into countries with cheap labor—they’re outsourced to our own homes.


What is Zero Trust Security and how can you enforce it?

Zero Trust Security, an alternative architecture for IT security was first introduced by Forrester and was rooted in the principle of 'never trust, always verify'. Zero trust security has come a long way since then. My message for companies that think they haven't been attacked is: You are not looking hard enough." James Snook Each enterprise and individual is at risk today given our huge dependency on the Internet.

Outpost24 webinar - Preventing wireless attacks with device visibility and effective controls

In 2020 we’ve seen a growing number of security professionals become more aware of wireless threats and the majority lack confidence in how to prevent them impacting their business. Join our webinar as we discover the key trends in wireless security from our recent RSA 2020 survey and Internet of Evil Things report. Our wireless expert will explore the different challenges we face in securing our network airspaces and combatting the most common threats by creating more effective classification of risk assessment through automation.

Outpost24 Webinar: Common Wireless Security Threats and How to Avoid them

The #1 challenge for busy security professionals is how can you secure what you don’t know about? 100% of companies has reported finding rogue consumer devices lurking on their enterprise network, highlighting the risk of airborne attacks. Join our webinar to learn how best to discover full scope of what you own and spot anomalies before rogue devices turn malicious.

Who Uses A Network Performance Monitor

Network performance monitoring has become a standard practice for modern businesses. With the shift towards large cloud-based applications, and hosted services, businesses rely on optimal network performance to sustain some of their key applications. Because of that, tools like network performance monitoring software have piqued the interest of users even outside of the IT team.