IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
Understanding Security Ratings
sponsored by Security Scorecard
WHITE PAPER: Security ratings grade your organization on how well it protects information. In a digital world, the importance of data and your company's protection of that data parallels your income and protection of financial assets. In this white paper, learn all things security ratings including what they are and why they are useful.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Security Scorecard

Integrated Security Analytics
sponsored by Forcepoint
WHITE PAPER: Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise makes the task of identifying genuine data theft risks challenging, even for well-resourced security operations teams. In this white paper, read about Forcepoint's integrated security analytics system.
Posted: 04 Feb 2019 | Published: 31 Dec 2017


Managed Detection and Response (MDR): An overview of 24/7 alert monitoring and threat hunting services
sponsored by Trend Micro, Inc.
WHITE PAPER: Organisations are facing stealthy threat actors who are employing techniques designed to bypass existing security measures. Enterprises have to be aware of the ways in which their organisation might be targeted. In this white paper, learn about how a Managed Detection and Response service can help your organisation.
Posted: 30 Jan 2019 | Published: 30 Nov 2018

Trend Micro, Inc.

The Essential Guide to Machine Data
sponsored by Splunk
EBOOK: The challenge in leveraging big data comes in the form of a dizzying array of unpredictable formats. Traditional monitoring and analysis tools just weren't designed for this variety, velocity, volume or variability. Download this e-book now for insight into making sense (and profit) from all this new data.
Posted: 22 Jan 2019 | Published: 31 Dec 2017


Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: The traditional network security perimeter has dissolved, primarily because of the rise of mobile employees and the adoption of cloud services. The result of this is overwhelmed security teams. In this white paper, learn how Forcepoint's Dynamic Data Protection helps organizations solve the fundamental challenges of traditional DLP deployments.
Posted: 05 Feb 2019 | Published: 05 Feb 2019


ALTR's Transformational, Blockchain-Based Data Security Platform Neutralizes the Privacy and Breach Exposures Created by the People Inside of Networks.
sponsored by ALTR
RESOURCE: Data risk is a part of almost every urgent technology conversation in the enterprise. Most issues are a result of the humans that are inextricable parts of our networks. Fortunately, the ALTR platform reduces data risks to virtually zero. In this white paper, learn how ALTR's platform provides visibility control and protection over valuable data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019


Aflac Adopts Splunk Platform for Analytics-Driven Security
sponsored by Splunk Services UK Ltd
CASE STUDY: Aflac is the leading provider of voluntary insurance in the U.S. Facing an increase in the volume and velocity of security threats, Aflac needed a new analytics-driven security approach. In this case study, learn about the benefits Aflac has seen since deploying Splunk Enterprise Security and Splunk User Behavior Analytics.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk Services UK Ltd

CloudSOC and Email for Microsoft Office 365
sponsored by Symantec
RESOURCE: Keep your Office 365 safe with Symantec security solutions for email, file sharing, and collaborative apps. With Symantec CloudSOC and Email, you can secure your email and apps against threats, protect your data and gain control over your accounts. Download this resource to gain a better understanding of Symantec solutions.
Posted: 31 Jan 2019 | Published: 31 Jan 2019


IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017


Eliminating the Blind Spot
sponsored by Dell SecureWorks
WHITE PAPER: Today, enterprises must obtain end-to-end visibility, detection and response capabilities required to quickly remediate breaches. In this white paper, learn how unifying advanced detection technologies for the network and endpoint with the right intelligence, people and processes can empower a security team.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Dell SecureWorks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement