ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Systems Research

  • ThreatQ for Government Agencies

    Sponsored by: ThreatQuotient

    As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.

  • Beginners Guide to Open Source Intrusion Detection Tools

    Sponsored by: AT&T Cybersecurity

    Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.

  • 2018 Global Study on Application Security

    Sponsored by: Arxan

    Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.

  • Preventing Unknown, Zero-Day Attacks

    Sponsored by: Checkpoint Software Technologies

    An organizations ability to win the cybersecurity battle depends on how well they prevent unknown, zero-day threats. In this white paper, learn how threat prevention technology, and a consolidated security architecture can help to protect your organization’s attack vectors.

  • Gartner report: 2019 Market Guide for Security Orchestration, Automation and Response Solutions

    Sponsored by: IBM

    The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their security operations.

  • Six Steps for Building a Robust Incident Response Function

    Sponsored by: IBM

    In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.

  • How Machine Learning Can Help You Keep up with Current Threats

    Sponsored by: Dell SecureWorks

    Although organizations are spending billions of dollars on cybersecurity products, cyberattacks are continuing to be successful. This means that their tools need to be updated. In this e-guide, learn how AI and ML can help to improve your cybersecurity tools and processes.

  • Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System

    Sponsored by: Claroty

    A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.

  • Gartner report: 2019 Market Guide for Security Orchestration, Automation and Response Solutions

    Sponsored by: IBM

    The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their security operations.

  • The State of Detection Report 2019

    Sponsored by: Fidelis

    Cybersecurity hasn't gotten any easier. That should hardly be a revelation to security professionals in the field, who every year are seeing their cyber terrain grow larger and larger. In The State of Threat Detection Report 2019, explore Fidelis' findings from a survey of 300 cybersecurity professional on key cybersecurity challenges.

  • Fidelis Deception Demo

    Sponsored by: Fidelis

    Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.

  • The First 72-Hours: How to Approach the Initial Hours of a Security Incident

    Sponsored by: Fidelis

    Over the course of responding to thousands of critical security incidents, Fidelis Security has seen organizations approach the initial hours of an incident in every conceivable way. In this white paper, discover the 1st steps security teams should take when responding to an incident.

  • Fidelis Endpoint : A Technical Deep Dive

    Sponsored by: Fidelis

    In this solution overview, learn how Fidelis Endpoint unifies endpoint detection and response (EDR) and endpoint protection platform (EPP) capabilities to meet the needs of IT endpoint management and mature security operations.

  • Six Steps for Building a Robust Incident Response Function

    Sponsored by: IBM

    In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.

  • Red Cloak Threat Detection & Responses

    Sponsored by: Dell SecureWorks

    Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.

  • MDR Buyer's Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Managed detection and response (MDR) is an increasingly popular approach that addresses security monitoring challenges, as it delivers real-time, 24/7 managed detection and response using a holistic, turnkey approach. Download this buyer's guide for key features you should look for in an MDR service.

  • SOCs vs. AFCs: What's the Difference?

    Sponsored by: Optiv

    Advances in technology have often been perceived as threats rather than opportunities, due to the reactionary nature of the SOC model. But, Advanced Fusion Centers (AFCs) offer a modern approach to cybersecurity replacing this reactive model with an agile one. In this blog, explore the differences between SOCs and AFCs.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • Faster Response with Crowdstrike and MITRE ATT&CK

    Sponsored by: CrowdStrike

    As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.

  • Explore the ROI of CylancePROTECT and CylanceOPTICS

    Sponsored by: Blackberry Cylance

    To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.

  • Complete and Differentiated Managed Endpoint Detection and Response Services with Ensilo

    Sponsored by: enSilo

    The market for managed endpoint security services is both changing and growing. Providers are moving beyond traditional managed security services and offering services that protect against advanced threats. In this resource, learn how with enSilo, MSSPs can provide more effective and faster security.

  • Red Cloak Threat Detection & Response

    Sponsored by: Dell SecureWorks

    Security environments are now frustratingly fragmented. Even the most modern security stacks are a varied mix of vendors and tools. In this resource, learn how with Red Cloak Threat Detection & Response you can take security into your own hands and transform the way your security analysts detect, investigate and respond to threats.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • The Benefits of Automating Security with SOAR Tools

    Sponsored by: ServiceNow

    Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.

  • How to Improve Your Security Incident Response Process

    Sponsored by: ServiceNow

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.