IT Systems  >   Business Systems  >   Security Systems  >  

Intruder Detection System

RSS Feed   
Intruder Detection System Reports
 
Definitive Guide to Deception 2.0
sponsored by Acalvio
EBOOK: Currently, there exists a fundamental asymmetry in the security industry – we must get it right all the time, while the threat actor must get it right only once. But, with deception, the bad guys must be wrong only once to get caught. In this e-book, discover 10 essential requirements of a potent deception technology.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Acalvio

Security Instrumentation for Incident Response Teams
sponsored by Verodin
PRODUCT OVERVIEW: Effective incident response conditioning requires an ongoing feedback loop between offense and defense. In this brief, learn about the key security benefits of The Verodin Security Instrumentation Platform (SIP) including bridging the gap between offense and defense and improving incident prevention and detection configurations.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Verodin

Faster Response With Crowdstrike and MITRE ATT&CK™
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

CrowdStrike

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

CrowdStrike

Five Myths of Network Security in a Hybrid Infrastructure
sponsored by Trend Micro, Inc.
WHITE PAPER: Not surprisingly, the transition to a hybrid infrastructure is creating confusion among both security professionals and vendors regarding where security controls should be deployed. In this white paper, explore 5 myths about the need for traditional network security in a hybrid infrastructure.
Posted: 13 May 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

What to Look for in an MDR Provider
sponsored by Dell SecureWorks
WHITE PAPER: There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Dell SecureWorks

Breach Detection Systems Test Report
sponsored by Trend Micro, Inc.
ANALYST REPORT: NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000. In this Breach Detection System Test Report, explore the Deep Discover Inspector's security effectiveness, network performance and more.
Posted: 10 Jul 2019 | Published: 11 Oct 2018

Trend Micro, Inc.

Operationalizing Threat Intelligence Using Splunk® Enterprise Security
sponsored by Splunk
WHITE PAPER: Threat intelligence can provide critical security perspectives needed to inform an organization about current threats and to help develop a strategy against future threats. In this white paper, learn about the challenges and requirements of implementing high-coverage threat intelligence.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk

Assessing the Value of Cloud Security Threat Intelligence Services
sponsored by Hewlett Packard Enterprise
EGUIDE: This expert E-Guide deep dives into what a global threat intelligence service is, how well the services perform and if they are worth the investment. Read on to learn more.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Hewlett Packard Enterprise

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement