ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • Light Agent or Agentless

    Sponsored by: Kaspersky Lab

    Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.

  • Transforming Detection and Response: A SANS Review of Cortex XDR

    Sponsored by: Palo Alto Networks

    Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.

  • Stop targeted attacks and data loss on Exchange

    Sponsored by: Armorblox

    While email is rapidly moving towards the cloud, most organizations opt for on-premise or hybrid deployments. Unfortunately, cloud-based email security solutions are often ill-equipped to protect hybrid inboxes. Download this solution brief to learn more about a cloud email security platform designed to stop targeted attacks and data loss.

  • MITRE ATT&CK Framework Q&A with Forrester Research

    Sponsored by: Capsule8

    In response to the growing popularity and adoption of the MITRE ATT&CK framework, John Zelonis, principal analyst at Forrester Research, provides answers to commonly asked questions and offers further insight into the MITRE ATT&CK framework, including: Who should use the framwork, where priorities should begin & how it falls short.

  • Managed Detection and Response (MDR+)

    Sponsored by: BlueVoyant

    As threat detection, isolation and mitigation becomes increasingly complex, organizations look to third-party vendors for managed detection and response tools and capabilities. This solution brief highlights the key capabilities of at BlueVoyant’s Managed Detection and Response (MDR+) for Microsoft Defender ATP – read on to unlock the features.

  • Artificial Intelligence in Cybersecurity

    Sponsored by: Spin Tech

    Given the nature of artificial intelligence, it’s no surprise to see organizations integrating AI capabilities into their cybersecurity strategies. This webinar provides a comprehensive overview of AI and its role in cybersecurity, offering expertise for evaluating AI-based cybersecurity tools and vendors.

  • Cybersecurity Evolved: The Sophos Business Impact

    Sponsored by: Sophos

    Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.

  • The Rise of Enterprise Ransomware

    Sponsored by: Sophos

    Ransomware attacks have recently seen a pattern shift towards larger enterprises – but why? This white paper further examines the ransomware threat landscape, including key threats to keep an eye on and critical security technologies organizations should include to protect themselves.

  • How Capsule8 Protects Containerized Environments

    Sponsored by: Capsule8

    When it comes to containerized environments, it’s often thought that isolation equals security. This isn’t the case – if the host is compromised, then the hacker can access any container on the host. Download this solution brief to learn more about how Capsule8 protects containerized environments from runtime threats to security and performance.

  • MITRE ATT&CK Evaluations — APT29

    Sponsored by: Trend Micro

    In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.

  • How the Cognito platform replaces IDS and enables organizations to detect intrusions again

    Sponsored by: Vectra AI

    While intrusion detection systems (IDS) and intrusion prevention systems (IPS) have long been a staple in incident response strategies, the modern threats that target today’s organizations require a new approach – perhaps one that leverages automation an AI. Read this white paper for more about defining the next generation of IDS.

  • 2020 SANS Network Visibility and Threat Detection Survey

    Sponsored by: ExtraHop

    Today’s networks – which embrace cloud, encryption, IoT and third-party vendor access – are becoming more complex, making visibility and security difficult. The following SANS report provides an in-depth look at the results from a recent network visibility and threat detection survey. Read on to view current trends and challenges.

  • Market Guide for Network Detection and Response

    Sponsored by: Vectra AI

    In this Gartner report, take a closer look at the crowded network detection and response (NDR) market, and discover an overview of current offerings, key vendors, and strategic recommendations. Read on to get started.

  • The Ransomware-as-a-Service Evolution Is Here, with Its Sights on Your Mainframe

    Sponsored by: BMC

    The latest iteration of ransomware, known as Ransomware-as-a-service (RaaS), provides hackers with access to ransomware resources in exchange for sending a portion of each ransom to the malware programmer. So, what proactive steps can organizations take against ransomware groups? Read this white paper to find out.

  • Indicators of Compromise and Why It Takes Six-Plus Months to ID a Breach

    Sponsored by: BMC

    Each year, cybercriminals find novel ways to bypass existing security measures and disrupt workflows. In order to effectively protect sensitive data, security approaches need to be an endless, ongoing effort as well. But identifying the indicators of an attack or compromise is tricky. Download this white paper for tips to get started.

  • Why IDS is Ineffective for Linux Production Environments

    Sponsored by: Capsule8

    While intrusion detection systems (IDS) may have been a core component in traditional security strategies, they lack the scalability, agility and visibility to keep up with today’s fast-paced cyberattacks. Download this white paper to discover 9 ways IDS in no longer a viable security option and how to detect threats in modern environments.

  • Essential Elements of a Penetration Test

    Sponsored by: Synack

    A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.

  • All Good Remediation Strategies Begin with Collaboration

    Sponsored by: Vulcan

    As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.

  • Hack the Pentagon Case Study

    Sponsored by: Synack

    The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.

  • The Synack Value

    Sponsored by: Synack

    As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.

  • Runtime Memory Analysis: A Better Way Forward for Vulnerability Management

    Sponsored by: Rezilion

    According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.

  • The Problem with CVSS Scores & What It Means for Vulnerability Management

    Sponsored by: Vulcan

    While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.

  • Your Guide to Mastering Vulnerability Remediation

    Sponsored by: Vulcan

    In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.

  • Rain Financial Case Study

    Sponsored by: Synack

    In this case study, follow Rain Financial, a digital currency exchange partner in the Middle East, as they embark on a journey to identify, remediate and proactively protect against vulnerabilities that threaten the security of their customers’ data.

  • Vulnerability Remediation in Three Steps

    Sponsored by: Vulcan

    As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.