Verint Blog

Experience the Next Evolution of Situational Intelligence and Video-Based Security with Verint at GSX 2019

by Jeffrey Lewis

posted at August 23, 2019

We continue to see threats to mission-critical organizations evolve and become more prevalent and sophisticated.  Hostile nation-states, growing workplace threats and violent extremism are putting pressure on organizations to take additional steps to protect what matters most. Whether that’s people, property, assets, or all of the above, when left unchecked, the security threats facing today’s

Part 2: 5 Challenges to consider while preparing for 5G Lawful Interception

by Tom Sadon

posted at August 22, 2019

Missed part 1? Read more about modern LI in 5 Things to Consider When Choosing a Modern Lawful Interception Monitoring Center. The introduction of 5G network technology, places law enforcement and intelligence agencies in a new race against criminals and terrorists, bringing new challenges to lawful interception. Existing lawful interception (LI) monitoring centers that are

5 Things to Consider When Choosing a Modern Lawful Interception Monitoring Center

by Tom Sadon

posted at August 1, 2019

Lawful interception (LI) monitoring centers allow law enforcement agencies and intelligence organizations, to track and monitor communications of specific targets. To successfully accelerate investigations of terrorism, criminal actions and other threats, LI monitoring centers should include advanced capabilities for data collection, data analysis and court-compliance data. Modern LI monitoring centers use advanced technologies based on

The Data Breach Epidemic – Key Findings from Verint’s comprehensive CTI report

by Verint Cyber Threat Intelligence Research Team

posted at July 16, 2019

In the past few years we have witnessed a growing number of significant data breaches. The Data Breach Epidemic Report reviews the most significant data breaches that occurred in 2018 and provides our analysis of the major data leaks. It also includes key trends we identified based on ~5B leaked records detected and analyzed by