All Research Sponsored By:Dell SecureWorks

How XDR can help boost your security operations
WEBCAST: 31% of organizations cite security silos as obstacles to stronger security resilience, and 45% of organizations use more than 20 tools to investigate and respond to an incident – today’s complex IT environments need a more effective approach to security. Watch this webinar to learn how XDR can boost your security operations.
Posted: 17 Mar 2022 | Premiered: Mar 17, 2022

TOPICS:  .NET

XDR buyer’s guide
WHITE PAPER: According to Gartner, extended detection and response (XDR) describes a unified security incident detection and response platform that automatically collects and correlates data from multiple proprietary security components. Access this XDR buyer’s guide to explores criteria you should look for when selecting a vendor.
Posted: 15 Mar 2022 | Published: 16 Mar 2022

TOPICS:  .NET

2021 State of the Threat
RESOURCE: 2021 was a year dominated by stories of cyberattacks: State-sponsored supply chain attacks, cyber-espionage, ransomware and more. Access this report, 2021 State of the Threat: A Year in Review, to learn more about the specific threats (and threat types) that made headlines in 2021.
Posted: 08 Feb 2022 | Published: 09 Feb 2022

TOPICS:  .NET

Secureworks Threat Intelligence Executive Report
RESEARCH CONTENT: The SecureWorks Counter Threat Unit research team analyzes security threats to help organizations protect their systems. Read their Threat Intelligence Executive Report to see notable developments in threat behaviors observed during September and October 2021 as well as lessons to consider.
Posted: 08 Feb 2022 | Published: 09 Feb 2022

TOPICS:  .NET

Ransomware Report - Summer 2021 - Volume 1
RESEARCH CONTENT: Recent headlines have brought new attention to an old problem: ransomware. This research report compiles key resources and exclusive industry insight to help you stay protected, including a closer look at common attack vectors, prevention tips, use cases and more. Read on to unlock the full report.
Posted: 20 Jan 2022 | Published: 27 Sep 2021

TOPICS:  Malware

The Impact of XDR in the Modern SOC
ANALYST REPORT: Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
Posted: 20 Jan 2022 | Published: 30 Nov 2020


The Total Economic Impact™ Of Secureworks®Taegis™ Managedxdr
ANALYST REPORT: Secureworks Taegis ManagedXDR delivers security analytics software, 24/7 analyst investigation, threat hunting, and incident response in a single solution. Download this Forrester report to see what Secureworks customers have to say about their experience using ManagedXDR and the ROI and business benefits from Forrester.
Posted: 20 Dec 2021 | Published: 17 Mar 2021

TOPICS:  Security

Your Guide to Threat Intelligence, AI & Incident Response
EGUIDE: Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
Posted: 27 Mar 2020 | Published: 27 Mar 2020


GDPR: The Race is on for Compliance
EGUIDE: Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.
Posted: 19 Jun 2017 | Published: 14 Jun 2017


10 Tips to Help You Minimize the Duration and Impact of a Security Breach
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013


Five Critical Rules for Firewall Management
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011


Presentation Transcript: Incident Response - Are you prepared?
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
Posted: 30 Aug 2011 | Published: 30 Aug 2011


Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.
Posted: 22 Aug 2011 | Published: 22 Aug 2011


Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
PRESENTATION TRANSCRIPT: Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011


Presentation Transcript: The Cybercrime War; When Are We Going to Win?
PRESENTATION TRANSCRIPT: Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
Posted: 22 Aug 2011 | Published: 22 Aug 2011


Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011


Presentation Transcript: Securing the Virtualized Environment - Keeping the Dream Alive
PRESENTATION TRANSCRIPT: View this presentation transcript as Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team explores roadblocks of securing virtual environments, common pitfalls, and offers advice on combating these issues.
Posted: 22 Aug 2011 | Published: 22 Aug 2011


Presentation Transcript: Has Your QSA Thrown You Under a Bus?
PRESENTATION TRANSCRIPT: After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
Posted: 22 Aug 2011 | Published: 22 Aug 2011


Presentation Transcript: How to Secure Your Mobile Devices
PRESENTATION TRANSCRIPT: In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.
Posted: 22 Aug 2011 | Published: 22 Aug 2011


Presentation Transcript: Vulnerability Scanning and Compliance
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011


Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
PRESENTATION TRANSCRIPT: In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011