All resources sponsored by:

Dell SecureWorks

25 Matches
Security and Risk Consulting Overview
sponsored by Dell SecureWorks
DATA SHEET:Consulting services help you rearrange your priorities to keep you secure and compliant. Access this resource now to learn what to look for in a security consulting service.
Posted: 10 Mar 2017 | Published: 30 Dec 2016
Get This Now


The Importance of Threat Intelligence Services
sponsored by Dell SecureWorks
WHITE PAPER:Threat actors are upping the ante in their methods to penetrate your environment. Don't leave your IT environment prone to attack. Learn about detection tech and methods that can provide your organization with elite cyber threat intelligence, malware analysis and rapid incident response.
Posted: 09 Mar 2017 | Published: 30 Dec 2016
Get This Now


You've Been Compromised - Now What?
sponsored by Dell SecureWorks
WHITE PAPER:Explore three critical questions you must answer and decisively act upon at the first signs of a security breach. Discover these questions to ensure your organization can protect itself from costly security incidents.
Posted: 08 Mar 2017 | Published: 30 Dec 2016
Get This Now


Six Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER:Let this white paper be your guide to implementing an effective, risk-based security approach. Learn how to identify the 6 key components needed to launch this type of approach, why it's effective at mitigating threats, and where you can customize the approach to provide maximum protection.
Posted: 07 Mar 2017 | Published: 07 Mar 2017
Get This Now


Board Oversight of Cybersecurity Risk: A Framework for Inquiry
sponsored by Dell SecureWorks
WHITE PAPER:Use this white paper as your tool for improving the board-management dialog on cybersecurity risk management. It will help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Posted: 06 Mar 2017 | Published: 06 Mar 2017
Get This Now


The Value of Network Penetration Testing
sponsored by Dell SecureWorks
WHITE PAPER:Penetration tests are a critical part in identifying vulnerabilities in your network and IT environment that a scanner will not pick up. This concise white paper provides practical information to consider as you determine the proper testing needed to strengthen and improve your network's security posture.
Posted: 06 Mar 2017 | Published: 30 Dec 2016
Get This Now


The Power of Precise Threat Intelligence
sponsored by Dell SecureWorks
WHITE PAPER:Learn how the proper threat intelligence choices can maximize protection for your organization. Discover how to tailor your threat intelligence to your needs and how to pick out the right tools for the job.
Posted: 03 Mar 2017 | Published: 03 Mar 2017
Get This Now


Uncover Often Overlooked Holes in Your Security
sponsored by Dell SecureWorks
WHITE PAPER:Learn how a second opinion on your security policies could be beneficial in ways that could surprise your organization. Access now to discover improved cybersecurity safeguards, how to close hidden exposure to unknown external web connections, and more.
Posted: 31 Oct 2016 | Published: 31 Oct 2016
Get This Now


The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER:This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016
Get This Now


Create a Solid Incident Response Plan and Respond to Threats Efficiently
sponsored by Dell SecureWorks
EGUIDE:In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers
Posted: 20 Apr 2016 | Published: 18 Apr 2016
Get This Now


Securing the Enterprise: 5 Pragmatic Steps to Security for the Practical CISO
sponsored by Dell SecureWorks
WHITE PAPER:This white paper presents five major areas of focus for the practical CISO. Build a culture of security across your organization and ensure all employees understand that no one is excluded from responsibility.
Posted: 28 Mar 2016 | Published: 01 Feb 2016
Get This Now


Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER:Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013
Get This Now


A pragmatic approach to security - How to stay secure in 2012
sponsored by Dell SecureWorks
WHITE PAPER:While it can be tempting to simply buy new security technologies to solve your problems, they are unlikely to help if the basics of an effective security practice are not in place. In this white paper, discover how your organisation can apply pragmatism to IT security and do more with what you already have.
Posted: 18 Nov 2011 | Published: 18 Nov 2011
Get This Now


The Threat Landscape: A View from the Inside
sponsored by Dell SecureWorks
WEBCAST:In this webcast, join Lee Lawson, head of the Security Testing and Response teams for EMEA, as he discusses today’s cyber threats facing organisations in the UK and across the globe.
Posted: 12 Oct 2011 | Premiered: Oct 12, 2011
Get This Now


Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks
WHITE PAPER:This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011
Get This Now


Presentation Transcript: Incident Response - Are you prepared?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
Posted: 30 Aug 2011 | Published: 30 Aug 2011
Get This Now


Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: The Cybercrime War; When Are We Going to Win?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Securing the Virtualized Environment - Keeping the Dream Alive
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:View this presentation transcript as Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team explores roadblocks of securing virtual environments, common pitfalls, and offers advice on combating these issues.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Has Your QSA Thrown You Under a Bus?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: How to Secure Your Mobile Devices
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Vulnerability Scanning and Compliance
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


25 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement