All resources sponsored by:

FireEye

1 - 25 of 34 Matches
How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013
Get This Now


SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization
sponsored by FireEye
WHITE PAPER:Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.
Posted: 06 Mar 2014 | Published: 06 Mar 2014
Get This Now


SANS 2013 Report on Digital Forensics and Incident Response Survey
sponsored by FireEye
ANALYST REPORT:This guide will help forensic professionals and their clients better prepare for future investigations and how to better allocate resources.
Posted: 06 Mar 2014 | Published: 31 Dec 2013
Get This Now


Advantage FireEye Debunking the Myth of Sandbox Security White Paper
sponsored by FireEye
WHITE PAPER:This guide debunks the myth of effective sandbox security and outlines inefficiencies within this popular strategy.
Posted: 06 Mar 2014 | Published: 31 Dec 2013
Get This Now


World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Today's New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them
sponsored by FireEye
WHITE PAPER:This guide explores how email-based cyber-attacks aim to subvert your security tools and steal your valuable business data.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Poison Ivy: Assessing Damage and Extracting Intelligence
sponsored by FireEye
WHITE PAPER:This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Hot Knives Through Butter: Evading File-based Sandboxes
sponsored by FireEye
WHITE PAPER:This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick.
Posted: 04 Mar 2014 | Published: 04 Mar 2014
Get This Now


Definitive Guide to Next Generation Threat Protection eBook
sponsored by FireEye
EBOOK:In today's evolving threat landscape, businesses of various sectors and sizes have fallen victim to sophisticated cyber-attacks. This in-depth eBook explores the next generation of threat protection and delves deep into various topics, such as advanced persistent threats.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
Get This Now


Digital Bread Crumbs – Seven Clues To Identifying Who’s Behind Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This guide uncovers various facets of malware attacks and what they reveal about the culprit.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
Get This Now


Big Threats for Small Businesses
sponsored by FireEye
WHITE PAPER:Data breaches are bad for business, but it can mean the end for small firms. This guide takes a look at today's threat landscape and explores cybercrime trends towards small and midsize businesses.
Posted: 03 Mar 2014 | Published: 31 Dec 2013
Get This Now


Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER:This guide explores 10 common mistakes businesses make when planning their security strategy.
Posted: 03 Mar 2014 | Published: 31 Dec 2013
Get This Now


Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments
sponsored by FireEye
WHITE PAPER:In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks.
Posted: 03 Mar 2014 | Published: 31 Dec 2013
Get This Now


From Target to Aggressor: How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This guide explores the widening gap between sophisticated cyber-attacks and the weak traditional defensive deployments in most data centers.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
Get This Now


The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks
sponsored by FireEye
WHITE PAPER:The rapidly evolving threat landscape has rendered many traditional security tools obsolete and IT departments are left with questions on what to do next. This guide explores several security architectures and helps you decide which one is best for your organization.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
Get This Now


Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER:This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
Get This Now


Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER:This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
Get This Now


Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER:This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
Get This Now


Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER:With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
Get This Now


FireEye Advanced Cyber Attack Landscape Report
sponsored by FireEye
WHITE PAPER:This guide explores the current threat landscape across the globe and how your business may be affected depending on industry and location.
Posted: 24 Feb 2014 | Published: 31 Dec 2013
Get This Now


FireEye Advanced Threat Report - 2H 2011
sponsored by FireEye
WHITE PAPER:This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues.
Posted: 01 May 2012 | Published: 01 May 2012
Get This Now


FireEye 1H 2011 Advanced Threat Report
sponsored by FireEye
ANALYST REPORT:This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
Posted: 14 Nov 2011 | Published: 14 Nov 2011
Get This Now


The New Status Quo: Zero-Day and Targeted APT Attacks
sponsored by FireEye
VIDEO:During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
Posted: 11 Jul 2011 | Premiered: 08 Jul 2011
Get This Now


CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER:The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones
Posted: 17 May 2011 | Published: 16 May 2011
Get This Now


Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY:This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
Posted: 10 May 2011 | Published: 10 May 2011
Get This Now


1 - 25 of 34 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement