All resources sponsored by:

Rapid7

19 Matches
Understanding Today's SOAR Market and Offerings
sponsored by Rapid7
EBOOK:One of the fastest growing security trends right now is the adoption of security orchestration and automation systems to help teams accomplish more, at a faster pace, and with greater accuracy. Download this buyer's guide for an understanding of today's SOAR market and offerings.
Posted: 03 Dec 2018 | Published: 03 Dec 2018
Get This Now


Quarterly Threat Report - Q3
sponsored by Rapid7
RESOURCE:Learn how cyber incidents and threats have evolved over the past year in this quarterly report.
Posted: 28 Nov 2018 | Published: 13 Nov 2018
Get This Now


Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER:To help your team be successful with testing, implementing and scaling automation, download this e-book for 4 security automation best practices.
Posted: 15 Oct 2018 | Published: 15 Oct 2018
Get This Now


The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER:Security orchestration and automation can make teams faster and more efficient. But, how do you measure that? Download this white paper to evaluate the return on your investments in security orchestration and automation.
Posted: 15 Oct 2018 | Published: 15 Oct 2018
Get This Now


Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
EBOOK:Whether your organization is currently SIEM-less, or you're exasperated by your current SIEM, trying to find the right SIEM solution can be overwhelming. Download this guide for practical advice on choosing your first (or next) SIEM.
Posted: 12 Sep 2018 | Published: 12 Sep 2018
Get This Now


3 Components of an Effective Anti-Phishing Strategy
sponsored by Rapid7
RESOURCE:According to the 2018 Verizon Data Breach Investigations Report, phishing attacks are the number one threat to businesses today as email and social engineering are the most common methods of attack. Read on to learn how a comprehensive anti-phishing program can be built with just 3 foundational elements.
Posted: 11 Sep 2018 | Published: 11 Sep 2018
Get This Now


It's Time to Elevate your Detection Program
sponsored by Rapid7
RESOURCE:When you entrust a partner to monitor your network for malicious behavior, they should elevate your program—across people, process, and technology. Here's an overview of how that can be accomplished, and where MSSPs and other managed detection and response (MDR) services fall short.
Posted: 21 May 2018 | Published: 21 May 2018
Get This Now


Managed Detection and Response Tool
sponsored by Rapid7
RESOURCE:Here is a quick overview of Rapid7's managed detection and response (MDR) tool evaluated across each security investigation stage – detect, validate, investigate, remediate and proactive hunt.
Posted: 21 May 2018 | Published: 21 May 2018
Get This Now


7 Best Practices for Cybersecurity
sponsored by Rapid7
EBOOK:Access this e-book to learn 7 best practices for cybersecurity.
Posted: 18 May 2018 | Published: 18 May 2018
Get This Now


Prepare for Battle: Building an Incident Response Plan
sponsored by Rapid7
WHITE PAPER:In this four-part e-book, learn how to build and test an incident response (IR) plan as an incident response plan serves as your master blueprint when navigating the challenges of serious security threats.
Posted: 18 May 2018 | Published: 18 May 2018
Get This Now


Quarterly Threat Report
sponsored by Rapid7
RESEARCH CONTENT:In this 2018 Q2 review, get a clear picture of the threat landscape within your unique industry, how these threats have changed, and what to expect for the rest of the year.
Posted: 11 Sep 2018 | Published: 21 Aug 2018
Get This Now


Quarterly Threat Report
sponsored by Rapid7
RESEARCH CONTENT:This 2018 Q1 report covers 3 main areas of concern for the modern enterprise security team. By breaking down the security trends through 2018 Q1, organizations can better redefine their security strategy to help protect their end users and business reputation.
Posted: 17 May 2018 | Published: 17 May 2018
Get This Now


The Australian Privacy Amendment Explored
sponsored by Rapid7
DATA SHEET:Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
Get This Now


GDPR Compliance: How to Comply with 3 Key Articles
sponsored by Rapid7
WHITE PAPER:While it will take a collection of services and tools to get into full compliance with the new General Data Protection Regulation (GDPR), security is a key piece. In this white paper, learn about a service which can help you prepare to meet 3 of the GDPR's articles so that you are ready to face this new law on every level of your IT environment.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
Get This Now


Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER:In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017
Get This Now


Discover a Fully Managed Detection and Response System
sponsored by Rapid7
RESOURCE:Inside this resource, learn how to simplify the procurement of security tools and staff with a suite of managed detection and response services. Read on to find out how you can gain user behavior analytics, threat intelligence based on data from over 5,000 users, and more.
Posted: 27 Nov 2017 | Published: 27 Nov 2017
Get This Now


What You Need to Know About the General Data Protection Regulation (GDPR)
sponsored by Rapid7
WHITE PAPER:In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.
Posted: 22 Nov 2017 | Published: 22 Nov 2017
Get This Now


The CISO's Guide to Virtualization Security
sponsored by Rapid7
WHITE PAPER:Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.
Posted: 18 Jul 2012 | Published: 12 Jan 2012
Get This Now


Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER:Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012
Get This Now


19 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement