IT Systems  >   Business Systems  >   Security Systems  >  

IDS

RSS Feed   
IDS Reports
 
5 Types of Insider Threats and How to Detect Them in Your ERP System
sponsored by Appsian
RESOURCE: Although insider threats are the leading cause of the majority (57%) of data breaches, organizations often overlook these threats and focus their efforts on defending against external attacks. Read this blog post and discover the 5 most common insider threats and how to detect them in your ERP system.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

Hunt Like a Pro: A Threat Hunting Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: Threat hunting is a proactive process of scanning the network for potential threats, isolating them and thwarting the malicious behavior before it gets a chance to spread. The goal is to tilt the advantage from the attacker back to the defender. Read this white paper to uncover the best practices necessary to get started hunting threats.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO: Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

AT&T Business: Customer Stories – NHS Management, LLC
sponsored by AT&T Cybersecurity
CASE STUDY: In this case study, see how NHS Management, a healthcare provider that supports 50 nursing homes, was able to address the growing security needs of their patients and establish a threat detection and incident response program that allowed them to protect and prevent unwanted access to patient data – read on for the full story.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Managed Detection and Response (MDR+)
sponsored by BlueVoyant
PRODUCT OVERVIEW: As threat detection, isolation and mitigation becomes increasingly complex, organizations look to third-party vendors for managed detection and response tools and capabilities. This solution brief highlights the key capabilities of at BlueVoyant’s Managed Detection and Response (MDR+) for Microsoft Defender ATP – read on to unlock the features.
Posted: 25 Jun 2020 | Published: 23 Jun 2020

BlueVoyant

Cybersecurity Evolved: The Sophos Business Impact
sponsored by Sophos
CASE STUDY: Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Sophos

Intrusion Detection and Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Intrusion Detection and Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com
 
Browse by Report Type:
IDS White Papers | IDS Multimedia | IDS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info