Identifying and Eliminating Blind Spots in your Network

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Enterprise networks are under siege and in flux. The SUNBURST attacks that compromised SolarWinds customers highlighted the weaknesses of traditional detection methods and exposed critical security blind spots. Security teams must address these security holes while handling new developments in their infrastructure. Cloud computing, remote working, and traffic encryption expand the attack surface while making threats harder to detect. How do we improve our network security in the face of these challenges?

Network detection and response (NDR) has emerged as a robust approach to detect highly evasive attackers in fast-evolving infrastructures. In this webinar, our panel of experts will discuss the nature of NDR, best practices, and some of the methods it supports to identify malicious behavior on the network. Learn how NDR enables you to detect unknown threats that other technologies miss and investigate them quickly.

Talking points:

  • In January, the White House announced its move toward a Federal Zero Trust Architecture by 2024. We’ll discuss how these recent directives have impacted the need for advanced NDR and EDR solutions.
  • With the recent high-profile supply chain attacks, how has NDR been able to identify threats that other technologies missed?
  • What does the future look like for NDR? How are NDR solutions enabling XDR strategies


Photo of Danny Bradbury

Danny Bradbury

Contributing Writer & North America Webinar Moderator

Photo of Daniel Ruef

Daniel Ruef

Technical Manager, Products Team, Carnegie Mellon University

Photo of Richard Tychansky

Richard Tychansky

Security Architect

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for OpenText here: Please see Infosecurity Magazine’s privacy policy for more information.