IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero Threats Reports
 
How to Build a High Performance Secure Network
sponsored by Aruba Networks
RESOURCE: Inside this resource learn how Aruba's UEBA tool, Introspect, helps detect attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Aruba Networks

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

Unified Threat Management: A Modern Solution to a Modern Problem
sponsored by Seqrite
WHITE PAPER: Read this white paper to learn why traditional methods of network protection are no longer sufficient to keep your data safe from today's advanced threats. Then, discover unified threat protection which uses a single appliance to perform many security functions.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Moving from Vulnerability Management to Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: Watch this webcast to uncover how Seton Hall University went from using spreadsheets for tracking vulnerability information to a new approach to vulnerability response.
Posted: 31 Aug 2017 | Premiered: Jul 11, 2017

ServiceNow

Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM
sponsored by Splunk
WHITE PAPER: Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Splunk

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Web security: Important but often overlooked
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 24 Nov 2017 | Published: 24 Nov 2017

ComputerWeekly.com

What you Need to Know About Cloud Security
sponsored by Arctic Wolf Networks, Inc.
EBOOK: In this e-book, gain a stronger understanding of the 3 most prominent types of cloud services and the questions your organization should ask when building a network security platform.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arctic Wolf Networks, Inc.

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
WEBCAST: Find out how to extend the collaborative efforts between developers and IT operations to your security pros as well so that you can shift towards a DevSecOps culture and incorporate app security as early and often into the development lifecycle as you can.
Posted: 17 Jan 2018 | Premiered: May 25, 2017

Veracode, Inc.

Antimalware Protection and the Fundamentals of Endpoint Security
sponsored by OPSWAT inc
EGUIDE: In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement