IT Management  >   Systems Operations  >   Security  >   Network Security  >  

ID

RSS Feed   
ID Reports
 
Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE: Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020

Atakama

Magic Quadrant for Endpoint Protection Platforms
sponsored by CrowdStrike
RESEARCH CONTENT: Endpoint protection is evolving to address more of Gartner's adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. In this research report, explore Gartner's magic quadrant which includes top vendors along with strengths and cautions for each.
Posted: 27 Mar 2019 | Published: 24 Jan 2018

CrowdStrike

How a next-generation firewall prevents application-layer attacks
sponsored by SearchSecurity.com
EGUIDE: The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
sponsored by ESET
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

ESET

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

CounterTack Active Forensics: Continuous Network Monitoring for In-Progress Attacks
sponsored by CounterTack
WHITE PAPER: The security tools and strategies in use today are not enough to fight off APTs. Organizations need a new level of security that enables them to actively engage with attackers and take control of the impact of an attack in progress. Uncover how meet these needs with an active forensic system that provides better visibility and intelligence.
Posted: 22 Jun 2012 | Published: 22 Jun 2012

CounterTack
 
Browse by Report Type:
ID White Papers | ID Multimedia | ID IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences