sponsored by Guidance Software, Inc.
Posted:  16 Apr 2010
Published:  15 Apr 2010
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

The ability to detect complex cases of computer misuse within an organization is vital to the continuing survival of a company. In order to eradicate threats, a corporate CERT team needs highly sophisticated tools at its disposal, and the skills to use them. Traditional disk examination software and automated scanners have a part to play, but the future lies in the ability to scan the entire network in-depth, and then perform forensic analysis on the results.

In this white paper Robert Schifreen, UK-based IT Security Consultant and author of “Defeating the Hacker”, discusses why the need to forensically examine the network is an increasingly vital tool for modern companies; not just law enforcement and criminal investigation specialists. He also analyzes leading providers of this technology, including EnCase Cybersecurity, which is developed by the company behind the current leading forensic software.






BROWSE RELATED RESOURCES
Cybersecurity | Network Security | Network Security Software | Security | Security Infrastructure | Security Management | Security Standards | Security Threats

View All Resources sponsored by Guidance Software, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement