• > sign in
  • > Support
  • English
    • Español (Spanish)
Redborder | NDR Cybersecurity Solution
  • PLATFORM
    • Active Cybersecurity Next Generation IPS
    • Network Traffic Analysis (NTA)
    • Security Info & Event Management (SIEM)
    • Wireless Traffic Analysis
    • Hardware monitoring
    • Correlation AI engine
  • Products
    • Manager
    • Intrusion
    • Flow
    • App
  • About us
  • Contact
  • Partner
  • Blog
  • RedBorder LIVE
  • Become a partner
  • PLATFORM
    • Active Cybersecurity Next Generation IPS
    • Network Traffic Analysis (NTA)
    • Security Info & Event Management (SIEM)
    • Wireless Traffic Analysis
    • Hardware monitoring
    • Correlation AI engine
  • Products
    • Manager
    • Intrusion
    • Flow
    • App
  • About us
  • Contact
  • Partner
  • Blog
  • RedBorder LIVE
  • Become a partner
  • Home
  • Do you know what the main types of access attacks are?
  • Uncategorized

Uncategorized

30NovNovember 30, 2022

Do you know what the main types of access attacks are?

Rosario2024-09-10T08:18:41+00:00

The term access is broad and refers to the manipulation of data, access to a system or the escalation of unauthorized privileges. La recuperación de datos no autorizados es simpl...

RedBorder, UncategorizedRead more...
14FebFebruary 14, 2022

What is Network Discovery?

Rosario2024-09-10T08:18:42+00:00

While we would all like to think that our networks are perfectly maintained and documented, the reality is that sometimes you lose track of them. In some cases, the network can g...

RedBorder, UncategorizedRead more...
08FebFebruary 8, 2022

How to use KPIs to generate results in Cybersecurity?

Rosario2024-09-10T08:18:42+00:00

Obtaining investment from business leaders to create a mature cybersecurity program and fund initiatives is imperative to success in enterprise risk mitigation. Often, security a...

RedBorder, UncategorizedRead more...
31JanJanuary 31, 2022

What is Extended Detection and response (XDR)?

Rosario2025-07-29T07:55:49+00:00

You've probably read an article, watched a talk or listened to a webinar about what the term XDR, also known as extended detection and response, is. The cyber security research fir...

RedBorder, UncategorizedRead more...
25JanJanuary 25, 2022

How SIEM correlation rules work

Rosario2024-09-10T08:18:43+00:00

SIEM is a powerful security tool when implemented correctly. Network security devices such as IDS devices, IPS devices and firewalls generate a large number of logs. A well-confi...

RedBorder, UncategorizedRead more...
11JanJanuary 11, 2022

What is a cybersecurity strategy and how can a company develop one?

Rosario2024-09-10T08:18:43+00:00

The number of users, devices and resources on enterprise networks is growing exponentially. With this expanding attack surface, a company's assets, intellectual property, reputat...

RedBorder, UncategorizedRead more...
19NovNovember 19, 2021

What is an advanced persistent threat?

Rosario2024-09-10T08:18:44+00:00

As the threat landscape evolves faster than we can keep up with, organizations need to be aware of the type of threats they may face. Certain types of threats, such as ransomware...

RedBorder, UncategorizedRead more...
15NovNovember 15, 2021

How can DPI be used in security?

Rosario2024-09-10T08:18:44+00:00

After the last post where we learned about deep packet inspection (DPI), we will talk about how this tool can be used in security products such as redborder. 1. The DPI exam...

RedBorder, UncategorizedRead more...
05NovNovember 5, 2021

What is deep packet inspection (DPI)?

Rosario2024-09-10T08:18:44+00:00

If you are browsing any website ... If you are sending an email ... If you are watching a movie on Netflix ... If you are making a Skype call or a Zoom meeting ... It...

RedBorder, UncategorizedRead more...
15SepSeptember 15, 2021

IoT security: risks and solutions

Rosario2024-09-10T08:18:46+00:00

Internet of Things (IoT) is a term used to describe a system of interconnected computing devices that use the Internet to send and receive data without requiring person-to-device o...

RedBorder, UncategorizedRead more...
  Prev123Next  

Search

Support Center

Redborder Support Center is where you will find general information, FAQ and other documents that provide important information for customers and the community.

redborder

Redborder NDR is a Cybersecurity platform: active and scalable. We unify in one place some of the most powerful Cybersecurity tools such as, Next Generation IPS, Network Traffic Analysis, Security Information & Event Management (SIEM), Hardware Monitoring, Wireless Traffic Analysis (Cyber physics), big data and Correlation AI based engineand much more.

Recent Posts

CyberCan: A Real Cybersecurity Solution for SMBs
July 29, 2025
NDR in Metaphors: What Network Detection and Response Really Does
July 17, 2025
Achieving DORA Compliance with Redborder: A Strategic Approach
June 24, 2025
What You Need to Know About Cyber Threats in Q2 of 2025
June 10, 2025
Hackers Are Raiding Your Aisles
June 2, 2025
What We Learned from Monitoring 1 Billion Network Flows
May 14, 2025
Get In Touch

Contact Us

Eneo Tecnología S.L
Innovalia Group
  • Address: Parque Tecnológico de Bizkaia
    Edificio 500 – Planta 1. 48160 Derio (Bizkaia)
  • Phone: 620 19 17 81 / 650 11 06 99
  • Email:
  • Working Days/Hours: Mon - Sun / 9:00 AM - 8:00 PM

Follow Us

Twitter Linkedin
ens
> What we do
> About us
> Support
> Products
> Contact
> Redborder Live

Newsletter

Keep up on our always evolving product features and technology. Enter your e-mail and subscribe to our newsletter.

You have Successfully Subscribed!

Redborder | NDR Cybersecurity Solution © Copyright 2025. All Rights Reserved | Privacy Policy | Cookie Policy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}