• > sign in
  • > Support
  • Spanish
Redborder | NDR Cybersecurity Solution
  • PLATFORM
    • Security
    • Network Detection & Response (NDR)
    • Performance
    • Network Performance Monitoring (NPM)
  • About us
  • Contact
  • Partner
  • Events
  • Blog
  • RedBorder LIVE
  • Become a partner
  • PLATFORM
    • Security
    • Network Detection & Response (NDR)
    • Performance
    • Network Performance Monitoring (NPM)
  • About us
  • Contact
  • Partner
  • Events
  • Blog
  • RedBorder LIVE
  • Become a partner
  • Home
  • Understanding Event-Driven Architecture (and combinations) in Software Engineering
  • RedBorder

RedBorder

12DecDecember 12, 2024

Understanding Event-Driven Architecture (and combinations) in Software Engineering

Miguel Álvarez2024-12-17T09:01:25+00:00

What is Event-Driven Architecture? Event-Driven Architecture, or EDA in short form, is the architectural pattern of software engineering that comprises architecture guided by cr...

RedBorder, redBorderRead more...
17JunJune 17, 2024

Artificial Intelligence in Cybersecurity

admin2025-05-26T14:10:20+00:00

In the contemporary cybersecurity field, the evolution of artificial intelligence (AI)-driven threats is transforming the cyberattack landscape, equipping attackers with sophistica...

RedBorder, redBorderRead more...
29AugAugust 29, 2023

Types of DDoS attacks

Rosario2025-05-26T14:57:45+00:00

(Part 1) Distributed denial of service (DDoS) is a broad class of cyber attack that disrupts online services and resources by overwhelming them with traffic. This rend...

RedBorder, UncategorizedRead more...
30MayMay 30, 2023

What is Network Detection and Response (NDR)?

admin2025-05-29T08:26:50+00:00

Network Detection and Response (NDR) is a cybersecurity solution that continuously monitors network traffic to detect and respond to threats in real time. Unlike traditional tools ...

RedBorder, UncategorizedRead more...
14FebFebruary 14, 2022

What is Network Discovery?

Rosario2024-09-10T08:18:42+00:00

While we would all like to think that our networks are perfectly maintained and documented, the reality is that sometimes you lose track of them. In some cases, the network can g...

RedBorder, UncategorizedRead more...
31JanJanuary 31, 2022

What is Extended Detection and response (XDR)?

Rosario2025-07-29T07:55:49+00:00

You've probably read an article, watched a talk or listened to a webinar about what the term XDR, also known as extended detection and response, is. The cyber security research fir...

RedBorder, UncategorizedRead more...
25JanJanuary 25, 2022

How SIEM correlation rules work

Rosario2024-09-10T08:18:43+00:00

SIEM is a powerful security tool when implemented correctly. Network security devices such as IDS devices, IPS devices and firewalls generate a large number of logs. A well-confi...

RedBorder, UncategorizedRead more...
19NovNovember 19, 2021

What is an advanced persistent threat?

Rosario2024-09-10T08:18:44+00:00

As the threat landscape evolves faster than we can keep up with, organizations need to be aware of the type of threats they may face. Certain types of threats, such as ransomware...

RedBorder, UncategorizedRead more...
15NovNovember 15, 2021

How can DPI be used in security?

Rosario2024-09-10T08:18:44+00:00

After the last post where we learned about deep packet inspection (DPI), we will talk about how this tool can be used in security products such as redborder. 1. The DPI exam...

RedBorder, UncategorizedRead more...
05NovNovember 5, 2021

What is deep packet inspection (DPI)?

Rosario2024-09-10T08:18:44+00:00

If you are browsing any website ... If you are sending an email ... If you are watching a movie on Netflix ... If you are making a Skype call or a Zoom meeting ... It...

RedBorder, UncategorizedRead more...
12Next  

Support Center

The Redborder Support Center is where you’ll find general information, FAQs, and other documents that provide important information for customers and the community.

redborder

Redborder NDR is a proactive and scalable cybersecurity platform. We bring together some of the most powerful cybersecurity tools—including Next-Generation IPS, network traffic analysis, Security Information and Event Management (SIEM), hardware monitoring, wireless traffic analysis (cyber-physical), big data, and an AI-based correlation engine—all in one place.

Últimos artículos

Why CMDB is the Brain of Our NDR and NPM Platform
April 28, 2026
Why NDR Is Becoming the Most Critical Layer in Modern Cyber Defense
April 14, 2026
Agentic AI | Autonomous Agents | Multi-Agent Systems 2026
March 25, 2026
Why Endpoint Security Alone Is Failing in 2026
March 3, 2026
10 Threats That Will Shape Cybersecurity This Year
February 23, 2026
Credential Extraction: What’s Really Going on Inside your Network
January 30, 2026

Last articles

Why CMDB is the Brain of Our NDR and NPM Platform
April 28, 2026
Why NDR Is Becoming the Most Critical Layer in Modern Cyber Defense
April 14, 2026
Agentic AI | Autonomous Agents | Multi-Agent Systems 2026
March 25, 2026
Why Endpoint Security Alone Is Failing in 2026
March 3, 2026
10 Threats That Will Shape Cybersecurity This Year
February 23, 2026
Credential Extraction: What’s Really Going on Inside your Network
January 30, 2026
Get In Touch

Contact Us

Eneo Tecnología S.L
Innovalia Group
  • Address: Parque Tecnológico de Bizkaia
    Edificio 500 – Planta 1. 48160 Derio (Bizkaia)
  • Phone: +1 (980) 217 4766
  • Email:
  • Working Days/Hours: Mon - Sun / 9:00 AM - 8:00 PM

Follow Us

Twitter Linkedin
ens

> What we do
> About us
> Support
> Products
> Contact
> Redborder Live

News

Keep up on our always evolving product features and technology. Enter your e-mail and subscribe to our newsletter.

You have Successfully Subscribed!

Redborder | NDR Cybersecurity Solution © Copyright 2025. All Rights Reserved | Privacy Policy | Cookie Policy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}