- DECEPTION: We will update our 2016 “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” (update)
- DECEPTION: We will create a new deception technology comparison of most visible vendors (NEW).
- NTA / Network Traffic Analysis and Network Forensics: We will cover practices related to modern network security analytics, various modes of traffic analysis, use of traffic data for detection and response, etc (NEW)
There you have it. If you are an NTA, NFT or related vendor or a deception vendor, you know what to do.
Read Complimentary Relevant Research
How to Evaluate Cloud Service Provider Security
Security and risk management leaders continue to experience challenges to efficiently and reliably determine whether cloud service providers...
View Relevant Webinars
The Top 10 Basic Changes Needed for GDPR Compliance
The EU General Data Protection Regulation (GDPR) hovers over organizations like the sword of Damocles, with fines theoretically at an...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.