IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
The Basics of Auditing and Securing Your Network Perimeter with SIEM
sponsored by ManageEngine
WHITE PAPER: To thwart network attacks, you first need to be on top of critical security events occurring in your network. But due to the high volume of events, auditing these events in real time can be challenging, if not impossible. In this white paper, learn about the basics of auditing and securing your network perimeter by leveraging SIEM.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

5 Ways CIOs Can Optimize Communication With Other Executives
sponsored by BitSight
WHITE PAPER: Despite the fundamental importance of information technology and security, however, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

9 Common Security Mistakes Your Organization Might Be Making
sponsored by Involta
WHITE PAPER: Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER: Organizations are under constant threat from a barrage of scans and attacks delivered across IP traffic. In this white paper, learn how Armor's Dynamic Threat Block (DTB) is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack.
Posted: 08 May 2019 | Published: 08 May 2019

Armor

Red Cloak Threat Detection & Response
sponsored by Dell SecureWorks
RESOURCE: Security environments are now frustratingly fragmented. Even the most modern security stacks are a varied mix of vendors and tools. In this resource, learn how with Red Cloak Threat Detection & Response you can take security into your own hands and transform the way your security analysts detect, investigate and respond to threats.
Posted: 22 May 2019 | Published: 22 May 2019

Dell SecureWorks

Cloud in the Crosshairs
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: In 2018, enterprises continued to wrestle with challenges such as ransomware, insider threats, and DDoS attacks, all while struggling to simplify operations. In this research report, explore key findings from NETSCOUT's 14th annual worldwide infrastructure security report.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


SOAR Platforms: Everything You Need to Know About Security Orchestration, Automation, and Response
sponsored by ThreatConnect
WHITE PAPER: The increase of data and alerts means that quick decision-making and execution needs to find a way to scale. To counter this, many have turned to new technologies designed to automate and orchestrate some aspects of their cybersecurity operations. In this white paper, explore everything you need to know about SOAR.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

ThreatConnect

Driving in the Data Security Fast Lane: Secureworks Puts McLaren in Pole Position
sponsored by Dell SecureWorks
CASE STUDY: In motorsport, there are huge quantities of data being processed by engineers in the pit. Keeping this information secure and available when needed is essential. In this case study, learn how McLaren was able keep their data secure by deploying Securework's full cybersecurity platform across the organization to assess threats in real time.
Posted: 22 May 2019 | Published: 22 May 2019

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement