All resources sponsored by:

Rapid7

12 Matches
It's Time to Elevate your Detection Program
sponsored by Rapid7
RESOURCE:When you entrust a partner to monitor your network for malicious behavior, they should elevate your program—across people, process, and technology. Here's an overview of how that can be accomplished, and where MSSPs and other managed detection and response (MDR) services fall short.
Posted: 21 May 2018 | Published: 21 May 2018
Get This Now


Managed Detection and Response Tool
sponsored by Rapid7
RESOURCE:Here is a quick overview of Rapid7's managed detection and response (MDR) tool evaluated across each security investigation stage – detect, validate, investigate, remediate and proactive hunt.
Posted: 21 May 2018 | Published: 21 May 2018
Get This Now


7 Best Practices for Cybersecurity
sponsored by Rapid7
EBOOK:Access this e-book to learn 7 best practices for cybersecurity.
Posted: 18 May 2018 | Published: 18 May 2018
Get This Now


Prepare for Battle: Building an Incident Response Plan
sponsored by Rapid7
WHITE PAPER:In this four-part e-book, learn how to build and test an incident response (IR) plan as an incident response plan serves as your master blueprint when navigating the challenges of serious security threats.
Posted: 18 May 2018 | Published: 18 May 2018
Get This Now


Quarterly Threat Report
sponsored by Rapid7
RESEARCH CONTENT:This 2018 Q1 report covers 3 main areas of concern for the modern enterprise security team. By breaking down the security trends through 2018 Q1, organizations can better redefine their security strategy to help protect their end users and business reputation.
Posted: 17 May 2018 | Published: 17 May 2018
Get This Now


The Australian Privacy Amendment Explored
sponsored by Rapid7
DATA SHEET:Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
Get This Now


GDPR Compliance: How to Comply with 3 Key Articles
sponsored by Rapid7
WHITE PAPER:While it will take a collection of services and tools to get into full compliance with the new General Data Protection Regulation (GDPR), security is a key piece. In this white paper, learn about a service which can help you prepare to meet 3 of the GDPR's articles so that you are ready to face this new law on every level of your IT environment.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
Get This Now


Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER:In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017
Get This Now


Discover a Fully Managed Detection and Response System
sponsored by Rapid7
RESOURCE:Inside this resource, learn how to simplify the procurement of security tools and staff with a suite of managed detection and response services. Read on to find out how you can gain user behavior analytics, threat intelligence based on data from over 5,000 users, and more.
Posted: 27 Nov 2017 | Published: 27 Nov 2017
Get This Now


What You Need to Know About the General Data Protection Regulation (GDPR)
sponsored by Rapid7
WHITE PAPER:In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.
Posted: 22 Nov 2017 | Published: 22 Nov 2017
Get This Now


The CISO's Guide to Virtualization Security
sponsored by Rapid7
WHITE PAPER:Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.
Posted: 18 Jul 2012 | Published: 12 Jan 2012
Get This Now


Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER:Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement