All resources sponsored by:

AT&T Cybersecurity

1 - 25 of 37 Matches
The state of SIEM
sponsored by AT&T Cybersecurity
WHITE PAPER:Take a look at the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


The Relationship Between Security Maturity and Business Enablement
sponsored by AT&T Cybersecurity
WHITE PAPER:AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.
Posted: 20 May 2020 | Published: 20 May 2020
Get This Now


5 Building Blocks for Strengthening Your IT Security Program
sponsored by AT&T Cybersecurity
WHITE PAPER:Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.
Posted: 08 May 2020 | Published: 08 May 2020
Get This Now


5 Endpoint Attacks your Antivirus Won’t Catch
sponsored by AT&T Cybersecurity
WHITE PAPER:Attackers have figured out how to bypass traditional antivirus software with fileless attacks designer to hide within sanctioned applications. So, even if you’re vigilant about installing patches and pushing out antivirus updates, your organization is likely still at risk. Read on to learn about 5 endpoint attacks your antivirus won’t catch.
Posted: 08 May 2020 | Published: 08 May 2020
Get This Now


A guide to build vs. buy service models for threat detection and response
sponsored by AT&T Cybersecurity
WHITE PAPER:Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 07 May 2020 | Published: 07 May 2020
Get This Now


Help Reduce Cyber Risks and Simplify Your Journey to Compliance
sponsored by AT&T Cybersecurity
PRODUCT OVERVIEW:For organizations with a limited IT budget, gaining the visibility needed to understand security risks and address compliance requirements is a cumbersome task. In this solution brief, explore the features and capabilities of AT&T Cybersecurity – designed to simplify compliance and security – to see if it’s a good fit for your needs.
Posted: 13 Apr 2020 | Published: 13 Apr 2020
Get This Now


Detect Advanced Threats with Endpoint Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET:Corporate endpoints represent one of the top areas of security risk for organizations. That’s why many are turning to EDR solutions for an added layer of security. But EDR solutions can carry high cost and complexity for organizations. Learn about AT&T’s USM Anywhere and see how it takes a different approach to protecting endpoints.
Posted: 10 Apr 2020 | Published: 10 Apr 2020
Get This Now


The Essential Guide to Secure Web Gateways
sponsored by AT&T Cybersecurity
RESOURCE:Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.
Posted: 21 Feb 2020 | Published: 13 Jan 2020
Get This Now


Cybersecurity Insights Report Ninth Edition
sponsored by AT&T Cybersecurity
RESOURCE:5G is more than just an increase in speed; its rollout is expected to change the way organizations approach network and technology security. A recent study was conducted to uncover the potential impacts of 5G and the preparedness of enterprises. Read on to uncover the key insights from the research.
Posted: 08 Jan 2020 | Published: 08 Jan 2020
Get This Now


MDR Evaluator’s Guide
sponsored by AT&T Cybersecurity
RESOURCE:Managed detection and response (MDR) services equip organizations with scalable security and threat intelligence. However, the new market can be difficult to navigate. This evaluator’s guide is designed to help with the decision-making process by offering 10 key elements for considerations and questions to ask potential service providers.
Posted: 07 Jan 2020 | Published: 07 Jan 2020
Get This Now


AlienVault USM vs SIEM
sponsored by AT&T Cybersecurity
RESOURCE:Like any other security program, SIEM was helpful at detecting threats for a time. When new compliance regulations began requiring data records, SIEM became unable to handle the increased volume. This white paper highlights the shortcomings of SIEM and explores AlienVault’s Unified Security Management (USM) platform. Read on to learn more.
Posted: 07 Jan 2020 | Published: 07 Jan 2020
Get This Now


Best Practices for Office 365 Security Monitoring
sponsored by AT&T Cybersecurity
RESOURCE:In order to realize the full benefits of Office 365 cloud applications, establishing an appropriate cloud security strategy is essential. As with any new technology, there are valid security concerns to consider before making the switch. In this white paper, discover the security monitoring best practices for Office 365.
Posted: 06 Jan 2020 | Published: 06 Jan 2020
Get This Now


Beginners Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
RESOURCE:Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.
Posted: 06 Jan 2020 | Published: 06 Jan 2020
Get This Now


The Insider’s Guide to Incident Response
sponsored by AT&T Cybersecurity
WHITE PAPER:As an IT security pro, you need all the help you can get when preventing the worst-case scenario from happening. Luckily, The Insider’s Guide to Incident Response gives you all the tips and tricks you need to know. Download the guide now for info on building an incident response team, the different types of security incidents, and much more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020
Get This Now


How to Build a Security Operations Center
sponsored by AT&T Cybersecurity
RESOURCE:Regardless of the size or industry of an organization, network monitoring and threat detection are key strategies for maintaining security. SOC teams are critical for meeting this goal, as they aggregate the resources needed for ensuring protection. Read on to uncover the key roles and responsibilities you need to support a SOC.
Posted: 02 Jan 2020 | Published: 02 Jan 2020
Get This Now


SIEM for Beginners
sponsored by AT&T Cybersecurity
RESOURCE:Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.
Posted: 02 Jan 2020 | Published: 02 Jan 2020
Get This Now


Open Source Network Security Tools for Beginners
sponsored by AT&T Cybersecurity
RESOURCE:In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.
Posted: 10 May 2019 | Published: 10 May 2019
Get This Now


Practitioner's Guide to Building a Security Operations Center (SOC)
sponsored by AT&T Cybersecurity
WHITE PAPER:Explore this white paper that examines the tools, personnel and processes required to build and operate an effective SOC, along with an analysis of how organizations can leverage the AlienVault Unified Security Management (USM) platform as the foundation for a SOC.
Posted: 01 Aug 2018 | Published: 01 Aug 2018
Get This Now


6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
RESOURCE:Ready for SIEM deployment? Whether your goals are to detect threats, achieve compliance, or fuel incident response, these 6 steps to SIEM success will guide your team through key considerations to choose a SIEM platform that will work for your environment.
Posted: 31 Jul 2018 | Published: 30 Jun 2017
Get This Now


SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER:No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017
Get This Now


PCI Compliance with Unified Security Management
sponsored by AT&T Cybersecurity
WHITE PAPER:Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017
Get This Now


5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER:Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


The Perfect Rx for HIPAA Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER:Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


What You SIEM is What You Get
sponsored by AT&T Cybersecurity
WHITE PAPER:A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


Threat Intelligence Evaluator's Guide
sponsored by AT&T Cybersecurity
WHITE PAPER:One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


1 - 25 of 37 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info