IT Systems  >   Business Systems  >   Security Systems  >  

IDS

RSS Feed   
IDS Reports
 
Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: SOCs are a critical aspect to effectively identifying and addressing potential threats – however the evaluation process and subsequent RFP drafting process can be overwhelming with the amount of available options. The following white paper provides evaluation best practices and tips to guide RFP drafting to help you get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Cysiv

Explore the ROI of CylancePROTECT and CylanceOPTICS
sponsored by BlackBerry
WHITE PAPER: To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.
Posted: 26 Jun 2019 | Published: 31 May 2019

BlackBerry

How to Budget for Managed Detection and Response: A 6-step Guide for IT Security
sponsored by CI Security
WHITE PAPER: As a security leader, one of the biggest challenges is acquiring adequate security tools while staying under budget. Too often, sacrifices are made, leading to potential security gaps. This guide highlights 6 steps you should take when crafting a budget proposal for acquiring a managed detection & response tool Read on to get started.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

CI Security

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by Crowdstrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019


Apex One solution brief
sponsored by Trend Micro
PRODUCT OVERVIEW: The modern organization consists of distributed endpoints and mobile devices – as such, these new environments require threat detection capabilities that go beyond the scope of traditional threat management. Read this solution brief to learn more about Trend Micro’s Apex One, a modern endpoint threat detection & management offering.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

Trend Micro

Know your enemy: Protecting against the top threats of 2020
sponsored by Cisco Umbrella
RESOURCE: In 2019, threat traffic increased by 50x – a trend expected to increase in 2020. To help you understand the top cybersecurity threats, Cisco Umbrella put together this helpful infographic. Read on for 2019 trends and 2020 predictions.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Cisco Umbrella

The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

IDC Technology Spotlight
sponsored by GoSecure
WHITE PAPER: In order to address the increasing frequency (and efficacy) of malware attacks, organizations have begun embracing managed detection and response (MDR) tools. This report provides an overview of MDR required capabilities, emerging trends and a closer look at the key features and capabilities of the GoSecure MDR Platform.
Posted: 17 Sep 2020 | Published: 31 May 2020

GoSecure

Ransomware Prevention and Remediation
sponsored by BlackBerry
PRODUCT OVERVIEW: According to a recent study, 62% of organizations were victimized by ransomware – 58% of which opted to pay the ransom. As this threat vector becomes more lucrative for cybercriminals, expect these numbers to go up. So, what can be done about ransomware? Read this solution brief for BlackBerry’s answer.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.
 
Browse by Report Type:
IDS White Papers | IDS Multimedia | IDS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info