IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Intrusion Prevention

RSS Feed   
Network Intrusion Prevention Reports
 
Advantage, Network Metadata: How to Enhance Efficiency in Incident Investigations Without PCAP
sponsored by Gigamon
WHITE PAPER: For a long time network security teams have relied on using packet captures (PCAPs) as the go-to approach for incident investigation. Yet, PCAP can be slow, labor intensive and inefficient. Read this new technology brief and discover how to enhance investigation efficiency without using PCAP by leveraging the advantages of metadata capture.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Gigamon

What to Look for in an MDR Provider
sponsored by Dell SecureWorks
WHITE PAPER: There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Dell SecureWorks

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: The Secureworks Counter Threat Unit (CTU) regularly conducts research and releases reports related to current developments in threat behaviors and cybersecurity trends. In their most recent Threat Intelligence report, analyze March and April 2020 to discover how COVID-19 shaped the threat landscape, workplace trends, and more.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Dell SecureWorks

Managed Detection and Response (MDR+)
sponsored by BlueVoyant
PRODUCT OVERVIEW: As threat detection, isolation and mitigation becomes increasingly complex, organizations look to third-party vendors for managed detection and response tools and capabilities. This solution brief highlights the key capabilities of at BlueVoyant’s Managed Detection and Response (MDR+) for Microsoft Defender ATP – read on to unlock the features.
Posted: 25 Jun 2020 | Published: 23 Jun 2020

BlueVoyant

The Right Roles for SIEM and EDR
sponsored by Cybereason
WHITE PAPER: While most organizations recognize the need for security incident response and threat hunting, many are uncertain how to go about configuring a setup that meets their needs. In this white paper, explore the and benefits of configuring SIEM technologies with new tools like EDR and SOAR.
Posted: 21 Apr 2020 | Published: 22 Apr 2019

Cybereason

Implications of MITRE ATT&CK for Security Teams
sponsored by BlueVoyant
EBOOK: The MITRE ATT&CK framework is a global knowledge hub of observed cyberattack methods and tactics, designed to enable security teams with key insights for detecting and responding to an incident. This e-book offers an overview of the MITRE ATT&CK framework, its history and the implications for security teams. Read on to get started.
Posted: 11 May 2020 | Published: 11 May 2020

BlueVoyant

Measuring the ROI of Security Orchestration and Response Platforms
sponsored by Splunk
WHITE PAPER: Security orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Splunk

Runtime Memory Analysis: A Better Way Forward for Vulnerability Management
sponsored by Rezilion
WHITE PAPER: According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.
Posted: 22 May 2020 | Published: 22 May 2020

Rezilion

Information Security Asean July 2016
sponsored by SearchSecurity.com
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info