IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Intrusion Management

RSS Feed   
Network Intrusion Management Reports
 
2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

Time is Constrained. Security Threats are Not.
sponsored by Cisco & Presidio
DATA SHEET: Disparate security tools and efforts can lead to time-consuming complications, making an organization more vulnerable to cyberthreats. This data sheet highlights how SecureX can help unify security technologies and avoid these complications altogether – read on to learn more.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Cisco & Presidio

Case Study: Aspen Skiing Company
sponsored by Chronicle
CASE STUDY: In this case study, discover how the Aspen Skiing Company, owners and operators of a world-famous ski resort, partnered with Chronicle to address the various endpoint visibility, security and investigation challenges they were facing as a result seasonal staff and limited resources.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Chronicle

Introduction to DNSDB Part 1: Crawl
sponsored by Farsight Security
WEBCAST: Cheap, easy-to-obtain domain names, IP addresses and other DNS assets are helping to fuel today’s cybercrime, from spam and phishing to more sophisticated nation-state attacks. What can you do to stay protected? Jump into this webinar to learn how you can advance your threat intelligence and navigate roadblocks when using DNS in investigations.
Posted: 01 Dec 2020 | Premiered: Dec 1, 2020

Farsight Security

Threat Simulator: A Component of Keysight’s Breach Defense Solution
sponsored by Keysight
DATA SHEET: According to Keysight’s security survey, 50% of companies were breached because their cybersecurity solution was not working as expected. And alarmingly, 65% of companies do not verify that their solutions are working correctly. Click this data sheet to cover Keysight’s Threat Simulator, which can help get your security back on track.
Posted: 04 Feb 2021 | Published: 16 Feb 2020


The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation
sponsored by Palo Alto Networks
ANALYST REPORT: Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise

The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY: This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
Posted: 29 May 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info