Our $188M funding round fuels our mission to help customers confidently run modern cloud applications

Today, I am excited to share that we secured $188M in a new funding round, at a valuation of $1.19B (read more here). At the outset, I want to thank our employees, partners, investors and most importantly, our customers for this important milestone. The funding follows a year of unmatched innovation that led to accelerated revenue growth, installed base growth, and rapid community adoption of our open source projects.

Cloud Threats Memo: Beware Outsourced Cyber Attacks and Compromised Credentials

The trove of 1.3 million RDP credentials leaked recently is yet again proof that, In the underground economy, initial access brokerage is a flourishing market. Cybercriminals are outsourcing the initial access stage of the attack, so they can better focus on the execution and act more quickly.

Using Coralogix to Gain Insights From Your FortiGate Logs

FortiGate, a next-generation firewall from IT Cyber Security leaders Fortinet, provides the ultimate threat protection for businesses of all sizes. FortiGate helps you understand what is happening on your network, and informs you about certain network activities, such as the detection of a virus, a visit to an invalid website, an intrusion, a failed login attempt, and myriad others. This post will show you how Coralogix can provide analytics and insights for your FortiGate logs.

Why Your Brand Protection Relies on Threat Intelligence?

Your brand is the image your customers have of your business; this is precisely what makes your brand into such a valuable asset. It’s no surprise that brand presence is increasingly shifting into the digital realm. And while digital transformation brings with it a whole new world of possibilities, the digitization of the brand also introduces new risks.

Forward Fix LIVE: Network Query Engine

Original broadcast date: April 21, 2021 Network Query Engine: Using our Most Popular Feature to put Humans in Control of the Network Description Technical solutions architect Derick Winkworth demonstrates how operations teams are using the Google-like search features of NQE (Network Query Engine) to shave hours off of troubleshooting and provide unrivaled insight into network behavior. We double-dog dare you to attend this workshop and not find a better way to tame your network.

Priority on people - An argument against the excessive use of Cybersecurity technology

Despite what many advertisements and salespeople would like you to think, you don’t need to (and in many cases shouldn’t) spend a fortune on security tools to achieve a robust cybersecurity program. Some tools are essential, such as a ticketing tool or Security Information and Event Management (SIEM) system, but the best security programs are built off the employees that run the business.

Turning InfoSec Success into Audit Wins | Tips & Tricks Ep.1

Security and compliance are different, yet complementary, disciplines. It’s important to understand their relationship to build a robust security program that can be used for audit success. Compliance is a kick-starter for building your security program, and security is an important focus to help ensure you are audit-ready. Join us in our Tips and Tricks series. We’ve curated this series for you, whether you are a customer looking to make the most out of your Tripwire investment, or you’re on the market for a new security solution.

Forward Fix LIVE: Solving Your ACL Problems

Problems managing your enterprise network ACLs? Think there's no way around it? Forward has solutions to your ACL conflicts and chaos. From top-tier service providers to global financial services, Fortune 500 companies trust Forward to save them from troubleshooting headaches and avoidable network outages.

Forward Networks' Mathematical Model

After years of PhD research and commercial development, the team at Forward has delivered a modern approach to enterprise networking and we call it mathematical network modeling. The key idea is to use math to accurately represent your network's behavior, not one device or path, but everything, every possible behavior of your network. Our software-based digital twin provides rapid insights to understand reachability and security. So any network team can now move from reacting to getting ahead.