IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host IDS

RSS Feed   
Host IDS Reports
 
Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER: As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

Complete and Differentiated Managed Endpoint Detection and Response Services with Ensilo
sponsored by enSilo
RESOURCE: The market for managed endpoint security services is both changing and growing. Providers are moving beyond traditional managed security services and offering services that protect against advanced threats. In this resource, learn how with enSilo, MSSPs can provide more effective and faster security.
Posted: 23 May 2019 | Published: 23 May 2019


Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

SearchSecurity.com

How Internet Isolation Eliminates Threats That Evade Sandboxes
sponsored by Menlo Security
WEBCAST: Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.
Posted: 25 Jul 2019 | Premiered: Jul 25, 2019

Menlo Security

Practitioner's Guide to Building a Security Operations Center (SOC)
sponsored by AT&T Cybersecurity
WHITE PAPER: Explore this white paper that examines the tools, personnel and processes required to build and operate an effective SOC, along with an analysis of how organizations can leverage the AlienVault Unified Security Management (USM) platform as the foundation for a SOC.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

AT&T Cybersecurity

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon

Acalvio Deception and the MITRE ATT&CK Framework
sponsored by Acalvio
WHITE PAPER: The Cyber Kill Chain has long been used to describe the stages of an attack commonly used to compromise sensitive assets. Unfortunately, too much emphasis has been placed on the initial exploitation stages, and not enough on the later stages. To overcome this problem, MITRE has developed ATT&CK. Read on to learn about the framework today.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Acalvio

Critical Watch Report: The State of Threat Detection 2018
sponsored by Alert Logic
RESEARCH CONTENT: High-profile data breaches continue to make headlines, but the real news is the dramatic increase in volume and the intensity of cyberattacks it now affecting organizations of all sizes and types. Learn how your organization can keep up with the fast-moving threat landscape with 5 key security insights.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Alert Logic

Operationalizing Threat Intelligence Using SplunkĀ® Enterprise Security
sponsored by Splunk
WHITE PAPER: Threat intelligence can provide critical security perspectives needed to inform an organization about current threats and to help develop a strategy against future threats. In this white paper, learn about the challenges and requirements of implementing high-coverage threat intelligence.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement