IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Protection

RSS Feed   
Intrusion Protection Reports
 
The 5 Phases of Incident Response
sponsored by BlackBerry
WHITE PAPER: According to an IBM study, the “vast majority” of organizations today are unprepared to respond effectively to a serious security incident. Most often, this is due to chronic resource issues and inadequate planning. Get in the know – read this white paper to learn the 5 phases of incident response and how to implement them.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

Catch intruders in minutes, not months
sponsored by CI Security
PRODUCT OVERVIEW: As cyberattacks continue to increase in volume and complexity, organizations are turning to security service providers for managed detection and response (MDR) capabilities. This white paper highlights the key features of Critical Insight Managed Detection & Response (MDR) and provides a breakdown of use cases across several industries.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

CI Security

Leverage the power of Rapid7 and AWS integrated threat protection and response solution
sponsored by AWS Rapid7
VIDEO: Cloud environments are growing at such a rapid pace that traditional SIEM tools often lack the visibility to identify and mitigate threats – leading to an overworked security staff. This webinar discusses how the integration of Rapid7 InsightIDR and Amazon GuardDuty can improve visibility (and morale) for organizations with AWS environments.
Posted: 01 Oct 2020 | Premiered: 01 Oct 2020

AWS Rapid7

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

ServiceNow

Stopping Zero Days at The Speed of Digital
sponsored by Checkpoint Software Technologies
EBOOK: Most organizations are ill-equipped to handle the threat of zero-day cyberattacks. This e-book, Stopping Zero Days at The Speed of Digital, highlights 3 best practices that can help organizations better identity and mitigate these threats without compromising productivity – read on to get started.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Checkpoint Software Technologies

Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Hunt Like a Pro: A Threat Hunting Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: Threat hunting is a proactive process of scanning the network for potential threats, isolating them and thwarting the malicious behavior before it gets a chance to spread. The goal is to tilt the advantage from the attacker back to the defender. Read this white paper to uncover the best practices necessary to get started hunting threats.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY: This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
Posted: 29 May 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info