


NTA is a category of technologies designed to provide visibility into things like traffic within the data center (east-west traffic), VPN traffic from mobile users or branch offices, and traffic from unmanaged IoT devices. Network traffic analysis (NTA) – sometimes called network detection and response – is one such tool that provides that visibility. Gaining visibility into attacks that have successfully penetrated your network – including understanding how attackers got there and what damage they’ve done – is a key component of overall security. However, even when the best defenses are in place, adversaries can launch unlimited intrusion attempts, consequence-free, until they find a way in. The ultimate goal of cybersecurity teams is to prevent all attacks.

We’ll go into lots of detail on scenarios like the ones described below and the benefits for your organization. On March 17, we hosted a webinar called “ Leverage Your Firewall to Expose Attackers Hiding in Your Network ” to share tips on how you can use your firewall for network traffic analysis.
