IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats Reports
 
The Journey to IAM Success
sponsored by One Identity
WHITE PAPER: IAM is becoming a valuable enabler but, planning and deploying IAM is not without its challenges. In this white paper, discover first-hand opinions, lessons learnt and recommendations from senior peers in several global brands who have experienced the trials and triumphs of implementing their own IAM programs.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

One Identity

The Benefits of Network Visibility for Industrial Automation
sponsored by ForeScout
WHITE PAPER: Industrial assets owners have little to no visibility into existing industrial threats and flaws, and therefore no way to anticipate, analyze and respond to incidents. This whitepaper shows how the use of network monitoring technology in manufacturing networks brings tremendous value to both information technology and operational technology teams.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

ForeScout

The Pen Test Dilemma
sponsored by HackerOne
WHITE PAPER: Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Simplifying GDPR Compliance
sponsored by Micro Focus & PwC
WHITE PAPER: GDPR sets the foundation for how multinational organizations protect, and derive value from, sensitive customer information. In this white paper, learn about how Micro Focus delivers a set of solutions to help take action on customer data in accordance with GDPR, including the "right to be forgotten".
Posted: 08 Mar 2019 | Published: 31 Jan 2018

Micro Focus & PwC

Aruba Clearpass Policy Manager
sponsored by TechData - HPE
DATA SHEET: In this data sheet, learn more about Aruba's ClearPass Policy Manager. Key features of the product include advanced policy management, integration with security and workflow systems and advanced reporting and alerting.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

TechData - HPE

Bug Bounty Field Manual
sponsored by HackerOne
EBOOK: Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Managed Detection and Response vs. Managed Security Services: The Difference and How to Choose
sponsored by MASERGY
WHITE PAPER: The world of managed security services is expanding with Managed Detection and Response (MDR) services. This new approach is designed to accelerate threat discovery and response time, but what is MDR? How is it different from managed security service providers (MSSPs)? In this white paper, learn about the differences between MDR and MSSPs.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

MASERGY

Optimizing SIEM
sponsored by One Identity
WHITE PAPER: SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

One Identity

Automating Phishing Investigations at the No. 1 Managed Cloud Company
sponsored by Splunk Services UK Ltd
CASE STUDY: Rackspace implemented Splunk Phantom to investigate phishing emails. Using Phantom's Apps and Playbooks, Rackspace is able to quickly execute actions, ensuring a repeatable and auditable process for remediating phish. In this case study, explore the benefits that Rackspace has seen since deploying Phantom.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd

Bridging Cybersecurity Gaps with Managed Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: Managed detection and response (MDR) enables a proactive approach to security with its ability to detect and fully analyze threats and promptly respond to incidents. With the complexity of today's threats the stakes are high. In this resource, look at how MDR can face cybersecurity challenges.
Posted: 26 Feb 2019 | Published: 02 Oct 2018

Trend Micro, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement