Product
Solutions
Why Awake?
Resources
Blog
Case Studies
Datasheets
White Papers
Assessments
News
Events
Glossary
Videos
Partners
About
About Awake Security
Our Team
Board of Directors
Careers
Blog
Demo
Contact
Contact Us
Product
Solutions
Why Awake?
Resources
Blog
Case Studies
Datasheets
White Papers
Assessments
News
Events
Glossary
Videos
Partners
About
About Awake Security
Our Team
Board of Directors
Careers
Blog
Demo
Contact
Product
Solutions
Why Awake?
Resources
Blog
Case Studies
Datasheets
White Papers
Assessments
News
Events
Glossary
Videos
Partners
About
About Awake Security
Our Team
Board of Directors
Careers
Blog
Demo
Contact
Resources
View All
Blog Posts
Case Studies
Datasheets
Events
Glossary
News
Videos
Webinars
Whitepapers
All Topics
Advanced Security Analytics
Artificial Intelligence
Awake Security
Breach Response
Computer Science Problems
Network Traffic Analysis
Security
Security Analysis
Security Investigations
Security Landscape
Security Operations Center
Security Research
User Experience
Awake Security Amplifies Leading Cybersecurity Solutions with New Technology Alliance Program
News | Feb 13, 2019
Awake’s Network Detection and Response Platform Wins Gold
Blog Posts | Feb 5, 2019
EMA Picks Awake as “Top 3” Solution for Detecting Lateral Movement, Credential Abuse and Threat Hunting
Blog Posts | Jan 28, 2019
EMA Top 3 Report and Decision Guide for Security Analytics – White Paper
Whitepapers | Jan 24, 2019
Threat Hunting
Glossary | Jan 22, 2019
AI skills: 5 ways to build talent internally
News | Jan 22, 2019
Is NTA Just Another Kind of IDS?
News | Jan 15, 2019
DNS Record Manipulation: Detecting Attacker TTPs with Awake
Blog Posts | Jan 11, 2019
Real World Incidents Detected and Stopped by Awake – Case Studies
Case Studies | Jan 7, 2019
Lateral Movement: Spear Phishing Detection and Intelligent Response
Case Studies | Jan 7, 2019
Credential Theft: Following the Trail of a Spear Phishing Campaign
Case Studies | Jan 7, 2019
Data Exfiltration: Employee Selling Corporate Secrets
Case Studies | Jan 7, 2019
Command and Control: Tapping IP Phones In Sensitive Locations
Case Studies | Jan 7, 2019
Insider Threat: Contractor Spying with Security Cameras Case Study
Case Studies | Jan 7, 2019
Awake and Demisto Power Automated Network Detection and Response
Blog Posts | Dec 17, 2018
Spotting (and Stopping) Typosquatting Attacks with Awake
Blog Posts | Dec 14, 2018
Equifax breach report highlights multiple security failures
News | Dec 12, 2018
(JA)3 Reasons to Rethink Your Encrypted Traffic Analysis Strategies Webinar
Webinars | Dec 12, 2018
Security 2019 Predictions (Part 6)
News | Dec 12, 2018
Crouching Miner, Hidden Exfil Video
Webinars | Dec 12, 2018
Advanced Network Traffic Analysis and Why it Matters
Blog Posts | Dec 10, 2018
IoT 2019 Predictions (Part 2)
News | Dec 7, 2018
The Advent of Advanced Network Traffic Analysis & Why it Matters – White Paper
Whitepapers | Dec 4, 2018
Awake Security Researcher Says Repurposed Crypto Mining Software Can Siphon Corporate Intel
News | Dec 4, 2018
AI in 2019: 8 trends to watch
News | Dec 4, 2018
Marriott breach exposes more than just customer info
News | Dec 4, 2018
Awake Security Bolsters Exec Team with Darktrace and McAfee Alums
News | Dec 4, 2018
Hackers Use Crypto Mining Software To Attack Cos
News | Dec 3, 2018
Detecting malicious behavior blended with business-justified activity
News | Dec 3, 2018
Mining software isn’t just for cryptocurrency — it could also be used to steal corporate secrets
News | Dec 3, 2018
3 Takeaways from the Marriott & Starwood Breach
Blog Posts | Nov 30, 2018
Network Detection and Response
Glossary | Nov 29, 2018
Security Weekly Podcast: Awake Security debuts Network Traffic Analysis Platform
News | Nov 28, 2018
eWeek’s Daily Tech Briefing Announced The Awake Security Platform
News | Nov 28, 2018
Network Traffic Analysis
Glossary | Nov 27, 2018
Lateral Movement
Glossary | Nov 27, 2018
Insider Threat
Glossary | Nov 27, 2018
Fileless Malware
Glossary | Nov 27, 2018
Remote Access Tools: The Hidden Threats Inside Your Network Video
Webinars | Nov 26, 2018
Comprehensive Threat Detection and Response with Awake and Carbon Black
Blog Posts | Nov 26, 2018
Free Compromise Assessment – Datasheet
Datasheets | Nov 26, 2018
Awake Security Platform – Datasheet
Datasheets | Nov 20, 2018
Awake Security Support – Datasheet
Datasheets | Nov 20, 2018
Awake Security Debuts Network Traffic Analysis Platform to Detect Risks
News | Nov 20, 2018
Awake Security Uncovers Malicious Intent Across On-Premise, Internet of Things and Cloud Infrastructure
News | Nov 19, 2018
Awake Security Platform Fall 2018 Update
Blog Posts | Nov 19, 2018
Deep Learning for Network Traffic Analysis
Blog Posts | Nov 13, 2018
Advanced Persistent Threats (For Dummies)
Blog Posts | Nov 1, 2018
Show More