IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed   
Network Security Threats Reports
 
Security Orchestration, Automation and Response (SOAR) Capabilities
sponsored by Swimlane
EBOOK: Cybersecurity is a high-wire act, with significant challenges tied to both technology and operations. Protecting digital assets requires the right tools and processes. One way to handle the growing workload is by using SOAR platforms. In this e-book, review what it takes for a SOAR platform to be successful.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Swimlane

The Combination of Security and Agility: Managed Secure SD-WAN
sponsored by Open Systems Technologies
RESOURCE: Managed SD-WANs make it easy for global companies to set up global communication infrastructures. However, SD-WANs need to be protected against cyberattacks, and security risks caused by operating errors need to be reduced. In this article, learn how companies can achieve this by using managed SD-WAN with integrated security services.
Posted: 10 May 2019 | Published: 10 May 2019


Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT: Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018

Forcepoint

Insider Threat Report Executive Summary
sponsored by Verizon
RESEARCH CONTENT: Since insider threats have few barriers to overcome, it can take months or years for the threat to be discovered. Therefore, rogue partners, careless contractors and negligent (or malicious) employees can seriously disrupt your organization. In Verizon's Insider Threat Report, learn more about insider threats and how to prevent them.
Posted: 03 May 2019 | Published: 03 May 2019

Verizon

SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
sponsored by ThreatConnect
WHITE PAPER: SIEMs are a powerful tool for collecting and correlating event data. But to truly shine they need to be supported by other technologies – most notably, a threat intelligence platform. In this white paper, examine how security organizations can enhance their SIEM with a threat intelligence platform.
Posted: 01 May 2019 | Published: 01 May 2019

ThreatConnect

SOAR Platforms: Everything You Need to Know About Security Orchestration, Automation, and Response
sponsored by ThreatConnect
WHITE PAPER: The increase of data and alerts means that quick decision-making and execution needs to find a way to scale. To counter this, many have turned to new technologies designed to automate and orchestrate some aspects of their cybersecurity operations. In this white paper, explore everything you need to know about SOAR.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

ThreatConnect

The Truth about Shadow IT
sponsored by Cisco Umbrella
RESOURCE: Employees in every industry are expected to work quickly, but they're often frustrated by company-issued apps. As a result, they're downloading personal apps to get the job done instead of using secure, enterprise-approved tools. This is called shadow IT. In this infographic, learn how your organization can stop shadow IT in its tracks.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Maximizing SOC Effectiveness and Efficiency with Integrated Operations and Defense
sponsored by NetScout Systems, Inc.
WHITE PAPER: The most successful security programs are rarely the ones with the largest security budgets or staffs. The effectiveness of security operations increases by leveraging existing resources in more productive ways. In this white paper, explore leverage areas for assuring SOC success while taking advantage of integration opportunities.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

Armor File Integrity Monitoring (FIM)
sponsored by Armor
WHITE PAPER: When traditional firewalls or IDS fail to prevent or detect a threat, monitoring operating system and application changes at the host level provides an additional layer of security. In this white paper, learn more about Armor's File Integrity Monitoring which watches your hosts for unauthorized activities to detect potential threats.
Posted: 01 May 2019 | Published: 01 May 2019

Armor

Surviving Advanced Targeted Attacks By Augmenting (Or Replacing) Legacy AV With Ensilo
sponsored by enSilo
CASE STUDY: Beverage companies' data is constantly on the radar of competitors and threat actors looking to steal or maliciously modify ingredients in data breaches. In this case study, learn how one beverage company was able to discover over 300 potential threats and unauthorized programs running on their endpoint by installing enSilo.
Posted: 21 May 2019 | Published: 21 May 2019

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement