IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed   
Web Threats Reports
 
Increase Visibility into SSL Encryption to Boost Security
sponsored by F5 Networks
WHITE PAPER: Regaining visibility into encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business. Find out how SSL/TLS orchestration can help you get that visibility and deliver high-performance decryption and encryption of outbound TLS traffic—without slowing your traffic down.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

F5 Networks

Splunk for Advanced Analytics and Threat Detection
sponsored by Splunk
WHITE PAPER: Traditional security tools cannot scale to fully address the complexity of advanced security threats. In an evolving threat landscape, security teams need to respond by adding new analytic capabilities, giving them more eyes to see potential threats. In this white paper, learn about these new analytic capabilities.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Splunk

How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

Successfully Operating A Security Operations Center
sponsored by Armor
WHITE PAPER: Organizations are realizing that the only way to protect their networks and data around the clock is with a Security Operations Center (SOC) that operates 24/7/365. Read this resource to learn about the costs, staff roles, and technology needed to operate a successful SOC.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

Secure your Office 365 Environment
sponsored by Forcepoint
EBOOK: Many organizations have yet to fully migrate their users and apps over to a cloud-based Office 365 environment – largely due to security, compliance, and performance concerns. Discover 4 keys for building your Microsoft Office 365 security and performance strategy that will help you overcome these concerns.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Forcepoint

Defeating Threats Through User Data: Applying UEBA to Protect your Environment
sponsored by LogRhythm, Inc.
RESOURCE: Learn how to detect and respond to threats faster by focusing on user activity and behavior.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

LogRhythm, Inc.

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

What Hackers Know That You Don't
sponsored by Evident
WHITE PAPER: Companies such as LinkedIn, Uber and Equifax have all been victims of significant data hacks. In this white paper, uncover some basics of how breaches happen and where data travels when they do, as well as how you can strengthen security protocols to prevent breaches in the future.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

LogRhythm Defeating Threats Through User Data UEBA Whitepaper 2018
sponsored by LogRhythm, Inc.
RESOURCE: Learn how to detect and respond to threats faster by focusing on user activity and behavior.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

LogRhythm, Inc.

The Black Market Report: A Look Inside the Dark Web
sponsored by Armor
WHITE PAPER: In this report, gain insight into dozens of dark web and underground markets with a snapshot of the types of activities threat actors are participating in every day.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Armor
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement