IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats Reports
 
2018 State of Privacy and Security Awareness Report
sponsored by MediaPRO
WHITE PAPER: Find out how over 1,000 U.S. employees were ranked on their cybersecurity and data privacy know-how in this 2018 State of Privacy and Security Awareness Report.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

MediaPRO

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Stopping Breaches With Threat Graph
sponsored by CrowdStrike
WHITE PAPER: For many organizations, detecting attacks is often difficult, and sometimes impossible. In this white paper, learn about a threat graph that collects and analyzes extremely large volumes of security-related data to help stop breaches and detect threats.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

CrowdStrike

Exploring the Past, Present, and Future of Blockchain Technology
sponsored by Armor
WHITE PAPER: Download this report for an overview of blockchain's origins, its evolution to Blockchain 2.0, attraction for cryptopirates, and potential to expand into more legitimate industries.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

LogRhythm Defeating Threats Through User Data UEBA Whitepaper 2018
sponsored by LogRhythm, Inc.
RESOURCE: Learn how to detect and respond to threats faster by focusing on user activity and behavior.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

LogRhythm, Inc.

Why CASB alone isn't enough
sponsored by Open Systems
WHITE PAPER: When it comes to cloud-based workplaces, firewalls and traditional security tools may no longer be enough. Open this white paper to learn how Cloud Access Security Broker (CASB) closes that gap. Plus, come to know how CASB provides 4 critical security functions to allow for deeper visibility and inspection of cloud services.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Open Systems

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Integrated Security Management
sponsored by Skybox Security
RESOURCE: Learn how you can understand network connectivity, simulate attack vectors, and model your attack surface with an integrated cybersecurity management platform.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Skybox Security

Armor File Integrity Monitoring (FIM)
sponsored by Armor
RESOURCE: Download this resource to learn about an additional layer of security that can protect your cloud, on-premise, hybrid, or hosted IT environment from threats.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Armor

Fast Track Your Transformation to the Digital Workshop
sponsored by Dell
RESOURCE: Learn how you can deploy an end-to-end digital-workspace for your business and obtain performance, scalability, security, simplified management, and more.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Dell
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement