All resources sponsored by:

AT&T Cybersecurity

1 - 25 of 34 Matches
The Essential Guide to Secure Web Gateway
sponsored by AT&T Cybersecurity
RESOURCE:Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.
Posted: 21 Feb 2020 | Published: 13 Jan 2020
Get This Now


Cybersecurity Insights Report Ninth Edition
sponsored by AT&T Cybersecurity
RESOURCE:5G is more than just an increase in speed; its rollout is expected to change the way organizations approach network and technology security. A recent study was conducted to uncover the potential impacts of 5G and the preparedness of enterprises. Read on to uncover the key insights from the research.
Posted: 08 Jan 2020 | Published: 08 Jan 2020
Get This Now


Open Source Network Security Tools
sponsored by AT&T Cybersecurity
RESOURCE:With so many open-source tools available to help with network security, it can be tricky to figure out where to start. This beginner’s guide will provide you with the advice and expertise to help you navigate the extensive selection of tools. Read on to get started.
Posted: 08 Jan 2020 | Published: 08 Jan 2020
Get This Now


MDR Evaluator’s Guide
sponsored by AT&T Cybersecurity
RESOURCE:Managed detection and response (MDR) services equip organizations with scalable security and threat intelligence. However, the new market can be difficult to navigate. This evaluator’s guide is designed to help with the decision-making process by offering 10 key elements for considerations and questions to ask potential service providers.
Posted: 07 Jan 2020 | Published: 07 Jan 2020
Get This Now


AlienVault USM vs SIEM
sponsored by AT&T Cybersecurity
RESOURCE:Like any other security program, SIEM was helpful at detecting threats for a time. When new compliance regulations began requiring data records, SIEM became unable to handle the increased volume. This white paper highlights the shortcomings of SIEM and explores AlienVault’s Unified Security Management (USM) platform. Read on to learn more.
Posted: 07 Jan 2020 | Published: 07 Jan 2020
Get This Now


Best Practices for Office 365 Security Monitoring
sponsored by AT&T Cybersecurity
RESOURCE:In order to realize the full benefits of Office 365 cloud applications, establishing an appropriate cloud security strategy is essential. As with any new technology, there are valid security concerns to consider before making the switch. In this white paper, discover the security monitoring best practices for Office 365.
Posted: 06 Jan 2020 | Published: 06 Jan 2020
Get This Now


Beginners Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
RESOURCE:Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.
Posted: 06 Jan 2020 | Published: 06 Jan 2020
Get This Now


Beginner’s Guide to AWS Security Monitoring
sponsored by AT&T Cybersecurity
WHITE PAPER:In the Beginner’s Guide to AWS Security Monitoring, learn what the 3 biggest security concerns are and how you can get started with AWS security best practices.
Posted: 03 Jan 2020 | Published: 03 Jan 2020
Get This Now


The Insider’s Guide to Incident Response
sponsored by AT&T Cybersecurity
WHITE PAPER:As an IT security pro, you need all the help you can get when preventing the worst-case scenario from happening. Luckily, The Insider’s Guide to Incident Response gives you all the tips and tricks you need to know. Download the guide now for info on building an incident response team, the different types of security incidents, and much more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020
Get This Now


How to Build a Security Operations Center
sponsored by AT&T Cybersecurity
RESOURCE:Regardless of the size or industry of an organization, network monitoring and threat detection are key strategies for maintaining security. SOC teams are critical for meeting this goal, as they aggregate the resources needed for ensuring protection. Read on to uncover the key roles and responsibilities you need to support a SOC.
Posted: 02 Jan 2020 | Published: 02 Jan 2020
Get This Now


SIEM for Beginners
sponsored by AT&T Cybersecurity
RESOURCE:Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.
Posted: 02 Jan 2020 | Published: 02 Jan 2020
Get This Now


10 Opportunities for MSPs and MSSPs to Deliver MDR Services
sponsored by AT&T Cybersecurity
RESOURCE:For service providers, the Managed Detection and Response (MDR) trend creates an opportunity to stay competitive and add value that helps clients defend and respond to cyber threats. Read about 10 opportunities to embrace and deliver competitive MDR services.
Posted: 08 Jul 2019 | Published: 08 Jul 2019
Get This Now


Open Source Network Security Tools for Beginners
sponsored by AT&T Cybersecurity
RESOURCE:In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.
Posted: 10 May 2019 | Published: 10 May 2019
Get This Now


Practitioner's Guide to Building a Security Operations Center (SOC)
sponsored by AT&T Cybersecurity
WHITE PAPER:Explore this white paper that examines the tools, personnel and processes required to build and operate an effective SOC, along with an analysis of how organizations can leverage the AlienVault Unified Security Management (USM) platform as the foundation for a SOC.
Posted: 01 Aug 2018 | Published: 01 Aug 2018
Get This Now


6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
RESOURCE:Ready for SIEM deployment? Whether your goals are to detect threats, achieve compliance, or fuel incident response, these 6 steps to SIEM success will guide your team through key considerations to choose a SIEM platform that will work for your environment.
Posted: 31 Jul 2018 | Published: 30 Jun 2017
Get This Now


How to Build a Security Operations Center (on a Budget)
sponsored by AT&T Cybersecurity
WHITE PAPER:In this in-depth guide, get step-by-step instructions on how to create and run an enterprise-level security operations center by combining 4 key ingredients – and without breaking the bank.
Posted: 17 Nov 2016 | Published: 01 Jul 2017
Get This Now


Get Real Time Threat Detection Starting on Day 1 with AlienVault USM
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE:Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015
Get This Now


SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER:No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017
Get This Now


PCI Compliance with Unified Security Management
sponsored by AT&T Cybersecurity
WHITE PAPER:Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017
Get This Now


5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER:Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


The Perfect Rx for HIPAA Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER:Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


What You SIEM is What You Get
sponsored by AT&T Cybersecurity
WHITE PAPER:A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


Threat Intelligence Evaluator's Guide
sponsored by AT&T Cybersecurity
WHITE PAPER:One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


Security Operations Center (SOC) Essentials for the SME
sponsored by AT&T Cybersecurity
WEBCAST:Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014
Get This Now


How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST:This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014
Get This Now


1 - 25 of 34 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info