All resources sponsored by:

Prelert

1 - 25 of 47 Matches
Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE:In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016
Get This Now


7 Reasons to Deploy Retail Order Analytics
sponsored by Prelert
MICROSITE:Retailers, especially those involved in eCommerce, are missing a prime tool that would help them run their business: data analysis. Access this resource to learn why data analytics is so important and how to keep your retail business competitive in a changing market.
Posted: 26 Apr 2016 | Published: 01 Apr 2016
Get This Now


Detecting Malware-Free Intrusions and Advanced Cyber Threats with Anomaly Detection and "Behavioral MD5" of Endpoint Processes
sponsored by Prelert
ANALYST REPORT:This report shows you how machine learning can detect changes in endpoint process behavior to help protect your business. Access now to learn how you can automate the analysis of data by looking for helpful anomalies that indicate malicious activity.
Posted: 25 Apr 2016 | Published: 29 Feb 2016
Get This Now


Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
sponsored by Prelert
ANALYST REPORT:This report dispels misconceptions about machine learning and explains what its actual application is. Access now to learn about recent developments in machine learning-based security analytics capabilities.
Posted: 25 Apr 2016 | Published: 29 Jan 2016
Get This Now


Machine Learning Is Cybersecurity’s Answer to Detecting Advanced Breaches
sponsored by Prelert
ANALYST REPORT:This blog post talks about replacing legacy safeguards with new machine learnings, the heart of IT's shift in mindset. Access now to learn how to focus on identifying potential threats early rather than reacting to threats after they happen.
Posted: 25 Apr 2016 | Published: 21 Mar 2016
Get This Now


Star Wars X – Attack of the DROWNs: Machine Learning-based Anomaly Detection Finds the DROWN SSLv2 Vulnerability
sponsored by Prelert
ANALYST REPORT:This blog post teaches you about the DROWN vulnerability and exactly why it could be affecting your organization. Learn the great impact DROWN has had in the past and what you can do to patch this vulnerability.
Posted: 25 Apr 2016 | Published: 19 Apr 2016
Get This Now


Analyze Bigger Data with Summarized Input
sponsored by Prelert
RESOURCE:This detailed blog post describes how an API engine for anomaly detection can achieve high performance with summarized input. Read on to find examples of how to write job configurations to send pre-summarized data to this API.
Posted: 25 Feb 2016 | Published: 17 Mar 2015
Get This Now


Bringing Alert Management to the Present with Advanced Analytics
sponsored by Prelert
RESOURCE:This brief blog post explains how advanced machine learning analytics can filter out the background noise to identify and prioritize anomalies. Learn how this advanced analytics approach can empower you to identify problems before they impact the user experience.
Posted: 25 Feb 2016 | Published: 12 May 2015
Get This Now


A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER:Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016
Get This Now


Detecting Anomalous Events for the Elastic Stack
sponsored by Prelert
DATA SHEET:This resource describes a behavioral analytics solution that can be applied to any type of IT operations-related data in Elasticsearch. Discover how you can visualize multiple anomalous events and connect them to root causes, improve key operational metrics such as mean time to recovery, and more.
Posted: 25 Feb 2016 | Published: 25 Feb 2016
Get This Now


Security for the Elastic Stack: Earlier Detection of Threats
sponsored by Prelert
DATA SHEET:This brief resource describes a security solution for the Elastic Stack that can enable you to automate the analysis of massive Elasticsearch data sets, detect advanced threats earlier, minimize false positives, and more.
Posted: 25 Feb 2016 | Published: 25 Feb 2016
Get This Now


Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER:This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015
Get This Now


Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER:This brief resource delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015
Get This Now


Your Next Digital Security Guard Should be More like RoboCop
sponsored by Prelert
WHITE PAPER:In this white paper, discover how to use machine intelligence to patch major network security vulnerability gaps and mitigate human errors. Continue reading to learn how to identify abnormal and potentially malicious activity as it occurs.
Posted: 05 Feb 2016 | Published: 24 Jun 2015
Get This Now


Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER:This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015
Get This Now


Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER:This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015
Get This Now


Trend Estimation for Time Series Anomaly Detection
sponsored by Prelert
WHITE PAPER:This in-depth white paper teaches you how to properly use trend estimation for anomaly detection to improve your network security. Continue reading to learn how to avoid the most common difficulties of accurate automatic anomaly detection.
Posted: 03 Feb 2016 | Published: 05 Jan 2016
Get This Now


Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
WEBCAST:This webinar outlines how to protect your company from advanced threats and overcome common threat detection challenges that many organizations face. Tune in to learn about how you can protect your company from being the next headline in a data breach report.
Posted: 02 Feb 2016 | Premiered: Feb 2, 2016
Get This Now


Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER:This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015
Get This Now


Behavioral Analytics: Telling the Stories Hidden in IT Security and Operations Data
sponsored by Prelert
WEBCAST:In this webcast, learn how to go beyond anomaly detection with behavioral analytics and insights. Discover how to investigate commonalities between anomalies to better understand and identify potential threats.
Posted: 02 Feb 2016 | Premiered: Jan 27, 2016
Get This Now


Behavioral Analytics: Let Your Data Tell the Story
sponsored by Prelert
WEBCAST:In this brief webcast, learn how to analyze log data, find anomalies, and like them together faster. Uncover the steps to understand not only what happened in an incident, but how it happened as well. View now to learn more.
Posted: 02 Feb 2016 | Premiered: Jan 20, 2016
Get This Now


Prelert Analytics vs Holt-Winters Filtering
sponsored by Prelert
WHITE PAPER:In this technical brief, explore the comparison between two real time series data modeling and anomaly detection strategies. Learn how anomaly detection on real time series data requires specific modeling capabilities and review the results obtained with each approach.
Posted: 01 Feb 2016 | Published: 30 Dec 2015
Get This Now


Detect and Investigate DNS Tunneling with Security Analytics
sponsored by Prelert
WHITE PAPER:In this white paper, discover the benefits of enhancing anomaly detection and why it's imperative your network security leverages it.
Posted: 01 Feb 2016 | Published: 24 Aug 2015
Get This Now


Prioritizing IT Monitoring Alerts with Anomaly Severity Scores
sponsored by Prelert
WHITE PAPER:This white paper examines why organizations are turning to behavioral analytics to reduce noise and takes a closer look at one organization's success with the strategy.
Posted: 01 Feb 2016 | Published: 12 Aug 2015
Get This Now


Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT:In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015
Get This Now


1 - 25 of 47 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement