Research Library

Powered by

All Research Sponsored By:Dell SecureWorks

  • Building a Vulnerability Management Program: Challenges You Must Overcome

    Effective vulnerability management (VM) is one of the most important components of an enterprise security program – and yet it’s consistently contentious and difficult to implement. This is because it requires you to understand and address risk in a balanced fashion. View this white paper to learn 4 key challenges of effective VM.

  • The Forrester Wave™: Managed Detection And Response, Q1 2021

    This report is a guide for buyers considering Managed Detection and Response providers. Forrester analysts follow a publicly available methodology. Download the report to learn how the MDR vendors ranked in Forrester’s comprehensive evaluation.

  • An Introduction to Ranking a Vulnerability’s Priority Based on its Unique Network Context

    In this white paper, learn all about Contextual Prioritization, which is ranking a vulnerability’s priority based on its unique network context.

  • The Total Economic Impact™ Of Secureworks ® Taegis™ Managed X Dr

    To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four customers with experience using Secureworks ManagedXDR. Download the report to see what they said.

  • Secureworks: Insights from SolarWinds and the Next Steps for Cybersecurity

    The recent SolarWinds Orion software compromise gave the world a crash course in vulnerability. Leverage this webinar featuring incident response experts as they discuss the SolarWinds attacks and the lessons that can be drawn from them, including measures you can take to help keep your organization secure going forward.

  • Secureworks: Connecting the Dots

    In this video, learn how you can use XDR to detect and respond to threats. It also explains how XDR can detect zero-day and malware-less attacks, and attackers using previously unknown tools.

  • The Total Economic Impact™ Of Secureworks®Taegis™ Managedxdr

    Secureworks Taegis ManagedXDR delivers security analytics software, 24/7 analyst investigation, threat hunting, and incident response in a single solution. Download this Forrester report to see what Secureworks customers have to say about their experience using ManagedXDR and the ROI and business benefits from Forrester.

  • Taegis XDR

    In this 9-minute demo, learn about Secureworks Taegis XDR. It combines the power of human intellect with security analytics to unify detection and response across the entire ecosystem – cloud, endpoint, and network – for improved security outcomes and more efficient security operations.

  • Secureworks: Insights from SolarWinds and the Next Steps for Cybersecurity

    In this webinar, experts dispel common misunderstandings of the SolarWinds incident, provide an overview of countermeasures related to SolarWinds, and share insights into threat actor behavior based on incident response engagements and Secureworks Counter Threat Unit (CTU) research.

  • Secureworks: Connecting the Dots

    As threats become harder to detect, security teams must invest in modern solutions that detect, investigate and respond to threats across endpoints, network and the cloud. View this Secureworks webinar for a real-world style attack on an organization and learn how a security professional can use XDR to see and mitigate the attack.

  • Top 5 Reasons to Replace Your SIEMwith Secureworks®Taegis™ XDR

    Security Information and Event Management (SIEM) plays a key role in today’s security operations – but as security threats become more sophisticated and harder to detect, SIEM solutions have failed to follow suit. In this infographic we compare how XDR and SIEMs have addressed modern threats – read on to get started.

  • Threat Hunting Assessment

    In an effort to better prepare for and defend against today’s sophisticated cyberthreats, organizations have begun embracing proactive security measures – such as threat hunting. Read this Threat Hunting Assessment to unlock expert insight into the benefits of threat hunting and guidance for getting started.

  • Leve raging AI to Automate Vulnerability Management

    Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.

  • The Impact of XDR in the Modern SOC

    Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.

  • Threat Intelligence Executive Report

    The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

  • Secureworks® Taegis™ XDR

    XDR combines security analytics and threat intelligence expertise to enable your security analysts to precisely pinpoint unknown and sophisticated threats with advanced analytics, accelerated investigation and response and community-applied intelligence.

  • The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches

    A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.

  • The Business Executive’s Guide to Cybersecurity

    The days of cybersecurity being a siloed business function is no longer appropriate when considering the financial, reputational and legal implications of today’s cyberthreats. This white paper provides a guide for communication and collaboration between technical and non-technical business leaders – read on to learn more.

  • 5 Critical Steps to a More Mature Security Posture

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • Your Guide to Threat Intelligence, AI & Incident Response

    Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.

  • GDPR: The Race is on for Compliance

    Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.

  • 10 Tips to Help You Minimize the Duration and Impact of a Security Breach

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Five Critical Rules for Firewall Management

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.

  • Presentation Transcript: Incident Response - Are you prepared?

    In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.

  • Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks

    View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences