IT Management  >   Systems Operations  >   Security  >   Network Security  >  

ID

RSS Feed   
ID Reports
 
8 Real-World Use Cases for Security Orchestration, Automation and Response (SOAR)
sponsored by Swimlane
WHITE PAPER: Security operations present an escalating series of management challenges. However, SOAR platforms can help security teams automate tasks and aggregate data. This allows security teams to handle more tasks while decreasing mean times to resolution. In this white paper, explore 8 real-world uses cases for SOAR platforms.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Swimlane

Security Investigation, Detection & Rapid Response with Splunk Enterprise
sponsored by Splunk
WHITE PAPER: Investigation and rapid response is critical for day-to-day alert handling. The faster a threat and its impact can be detected and investigated, the faster an organization can take action. In this white paper, learn about how the Splunk platform enables organizations to understand their potential security threats and take the necessary actions.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk

Dragos Industrial Cybersecurity Platform
sponsored by Dragos
VIDEO: The industrial security community faces strategic challenges in responding to cyberthreats. In this video, learn about Dragos' industrial cybersecurity platform which helps ICS defenders to identify assets, detect threats and respond via investigation playbooks.
Posted: 02 Aug 2019 | Premiered: 11 Nov 2018

Dragos

Five Myths of Network Security in a Hybrid Infrastructure
sponsored by Trend Micro, Inc.
WHITE PAPER: Not surprisingly, the transition to a hybrid infrastructure is creating confusion among both security professionals and vendors regarding where security controls should be deployed. In this white paper, explore 5 myths about the need for traditional network security in a hybrid infrastructure.
Posted: 13 May 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

Critical Watch Report: The State of Threat Detection 2018
sponsored by Alert Logic
RESEARCH CONTENT: High-profile data breaches continue to make headlines, but the real news is the dramatic increase in volume and the intensity of cyberattacks it now affecting organizations of all sizes and types. Learn how your organization can keep up with the fast-moving threat landscape with 5 key security insights.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Alert Logic

The Seven Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter. An analytics-driven SIEM allows IT to monitor threats and respond quickly to incidents. In this white paper, discover 7 essential capabilities of an analytics-driven SIEM.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


SOCs vs. AFCs: What's the Difference?
sponsored by Optiv
RESOURCE: Advances in technology have often been perceived as threats rather than opportunities, due to the reactionary nature of the SOC model. But, Advanced Fusion Centers (AFCs) offer a modern approach to cybersecurity replacing this reactive model with an agile one. In this blog, explore the differences between SOCs and AFCs.
Posted: 01 Aug 2019 | Published: 23 Jul 2019

Optiv

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

CrowdStrike

Automating Incident Response
sponsored by Swimlane
WHITE PAPER: Staying on top of thousands of security alerts every day is exhausting for a cybersecurity team and missing even one incident can contribute to risk exposure. Learn how automated incident response and security orchestration can help alleviate these issues for your security team, today.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Swimlane
 
Browse by Report Type:
ID White Papers | ID Multimedia | ID IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement