IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

Definitive Guide to Software-Defined Perimeter Security
sponsored by Cyxtera
WHITE PAPER: Find out how to take an identity-centric approach to the software-defined network perimeter and explore two use cases for how this approach can help secure AWS resources and dramatically reduce the attack surface.
Posted: 03 Dec 2018 | Published: 31 Dec 2017

Cyxtera

Making the Modern Security Operations Center: The Difference Between Seeing and Doing
sponsored by Skybox Security
RESEARCH CONTENT: Access this IDC Q&A with research director of IDC's Worldwide Security Product service on making a more efficient, successful security operations center (SOC).
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Skybox Security

Organizations React to Security Threats More Efficiently and Cost Effectively
sponsored by Recorded Future
WHITE PAPER: While organizations may install security tools that integrate data feeds onto their network, many do not recognize what to do with the information that is coming in. In this IDC white paper, uncover the findings from interviews with 6 organizations regarding the impact of deploying a universal threat intelligence solution.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Recorded Future

Why CASB alone isn't enough
sponsored by Open Systems
WHITE PAPER: When it comes to cloud-based workplaces, firewalls and traditional security tools may no longer be enough. Open this white paper to learn how Cloud Access Security Broker (CASB) closes that gap. Plus, come to know how CASB provides 4 critical security functions to allow for deeper visibility and inspection of cloud services.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Open Systems

Deliver Secure, Contextual User Access on Any Device, Anywhere, Without Sacrificing IT Control
sponsored by Citrix
WHITE PAPER: Explore how you can achieve integration and secure cloud access for contextual user access management, without sacrificing IT control.
Posted: 23 Oct 2018 | Published: 23 Oct 2018

Citrix

The Tao of Intel Driven Security
sponsored by ThreatConnect
WHITE PAPER: Learn how to implement an intelligence-driven defense in your organization by uniting your threat intelligence and orchestration.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

ThreatConnect

Closing the Cybersecurity Gap
sponsored by Splunk
RESEARCH CONTENT: Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Splunk

Stopping Breaches With Threat Graph
sponsored by CrowdStrike
WHITE PAPER: For many organizations, detecting attacks is often difficult, and sometimes impossible. In this white paper, learn about a threat graph that collects and analyzes extremely large volumes of security-related data to help stop breaches and detect threats.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

CrowdStrike

Cloud Security: Are You Ready?
sponsored by Symantec
RESOURCE: Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Symantec
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement