IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Protection

RSS Feed   
Intrusion Protection Reports
 
Evaluating Endpoint Protection Platforms
sponsored by CrowdStrike
RESEARCH CONTENT: Endpoint protection is evolving to address more of Gartner's adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. In this research report, explore Gartner's magic quadrant which includes top vendors along with strengths and cautions for each.
Posted: 27 Mar 2019 | Published: 24 Jan 2018

CrowdStrike

Complete and Differentiated Managed Endpoint Detection and Response Services with Ensilo
sponsored by enSilo
RESOURCE: The market for managed endpoint security services is both changing and growing. Providers are moving beyond traditional managed security services and offering services that protect against advanced threats. In this resource, learn how with enSilo, MSSPs can provide more effective and faster security.
Posted: 23 May 2019 | Published: 23 May 2019


3 Minutes Until the Apocalypse
sponsored by Acalvio
WHITE PAPER: Most organizations utilize a SIEM in their SOC to aggregate, correlate and prioritize alerts presented to the frontline SOC Analyst. However, with a myriad of logs feeding into the SIEM, it is a daunting task to keep up with the alerts on the screen. In this white paper, learn 3 things security teams can do to make their lives better.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Acalvio

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Red Cloak Threat Detection & Responses
sponsored by Dell SecureWorks
WEBCAST: Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.
Posted: 13 Sep 2019 | Premiered: Sep 13, 2019

Dell SecureWorks

9 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: Many people associate the term "incident response" with recovery efforts following a major security breach. However, effective incident response is not just reactive, nor is it confined to major incidents. In this white paper, learn how an incident response provider can assist you with a range of prevention, detection, and response activities.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Dell SecureWorks

Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

SearchSecurity.com

Security Analytics for Threat Detection and Breach Resolution in 2019
sponsored by Gigamon
ANALYST REPORT: While there is no security silver bullet, security analytics is a great step forward for any organization to improve its ability to detect threats. In this white paper, explore the top 4 considerations for investigating a security analytics tool.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Gigamon

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement