ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • Definitive Guide to Moving Target Defense for Automated Bot Attacks

    Sponsored by: BotRX

    As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.

  • Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider

    Sponsored by: GoSecure

    According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner report to learn what these questions are and more.

  • How to Respond Rapidly to Emerging Cyberthreats

    Sponsored by: ThreatQuotient

    Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

  • Enhancing Orchestration Using Threat Intelligence

    Sponsored by: ThreatQuotient

    Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.

  • 5 Steps to Making Better Security Decisions

    Sponsored by: ThreatQuotient

    The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.

  • IDC Technology Spotlight

    Sponsored by: GoSecure

    In order to address the increasing frequency (and efficacy) of malware attacks, organizations have begun embracing managed detection and response (MDR) tools. This report provides an overview of MDR required capabilities, emerging trends and a closer look at the key features and capabilities of the GoSecure MDR Platform.

  • Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient

    Sponsored by: ThreatQuotient

    How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.

  • Trend Micro Vulnerability Protection Overview

    Sponsored by: Trend Micro

    This document outlines the process behind IDS/IPS rule creation and answers common questions about vulnerability coverage and security controls across Trend Micro’s various offerings. Read on to learn more about rule creation, quality assurance testing, hybrid cloud workload security, and more.

  • Cybereason EDR

    Sponsored by: Cybereason

    Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.

  • Complete Endpoint Protection

    Sponsored by: Cybereason

    In today’s fast-paced and increasingly distributed business environment, protecting the growing population of endpoints from cyberthreats has become increasingly challenging. In this data sheet, discover the key capabilities of Cybereason’s endpoint protection platform and see if it aligns with your endpoint security strategy.

  • Why Seconds Matter

    Sponsored by: Palo Alto Networks

    Todays' hackers are enjoying threats such as polymorphic malware that can avoid detection by constantly changing its identifiable features. How do security teams get around malleable threats? With inline machine learning, organizations may be able to stop threats while keeping business going. To learn more, read this comprehensive white paper.

  • 5 Critical Mistakes When Evaluating a Next-Generation Firewall

    Sponsored by: Palo Alto Networks

    If you are in the market for a firewall, then you have probably discovered that a next-gen firewall (NGFW) is the way to go. But how can you be sure you’re choosing the NGFW to meet your organization’s specific networking, performance and security needs? Check out this white paper to learn 5 mistakes to avoid when evaluating a NGFW.

  • Measuring the ROI of an Incident Response Platform

    Sponsored by: Palo Alto Networks

    A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.

  • A Web of Weak Spots: Securing Your Supply Chain with NDR and Collective Defense

    Sponsored by: IronNet

    Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.

  • Apex One solution brief

    Sponsored by: Trend Micro

    The modern organization consists of distributed endpoints and mobile devices – as such, these new environments require threat detection capabilities that go beyond the scope of traditional threat management. Read this solution brief to learn more about Trend Micro’s Apex One, a modern endpoint threat detection & management offering.

  • Measuring the ROI of Security Orchestration and Response Platforms

    Sponsored by: Splunk

    Security orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.

  • Cybereason MDR Packages

    Sponsored by: Cybereason

    Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.

  • Endpoint Detection and Response

    Sponsored by: Claranet

    In this 6-minute webinar, tune into a discussion about the evolution of endpoint detection and response (EDR) – from niche monitoring tool to a staple for overworked IT and security teams.

  • Threat Report: Maze Ransomware

    Sponsored by: Cysiv

    Since 2019, the Maze threat actor group has been conducting ransomware campaigns where they both block access to data on victims’ machines and threaten to publish sensitive data for ransom – known as Maze ransomware. In this report, discover a comprehensive analysis of Maze ransomware, how it works and how to prevent it.

  • Case Study: Aspen Skiing Company

    Sponsored by: Chronicle

    In this case study, discover how the Aspen Skiing Company, owners and operators of a world-famous ski resort, partnered with Chronicle to address the various endpoint visibility, security and investigation challenges they were facing as a result seasonal staff and limited resources.

  • Future of the SOC Forces shaping modern security operations

    Sponsored by: Chronicle

    The age of AI, IoT, cloud computing and other disruptive technologies has driven fundamental change in security operations approaches and objectives. This white paper explores 3 fundamental forces that are shaping the need to change threat management and SOCs – read on to learn more.

  • Know your enemy: Protecting against the top threats of 2020

    Sponsored by: Cisco Umbrella

    In 2019, threat traffic increased by 50x – a trend expected to increase in 2020. To help you understand the top cybersecurity threats, Cisco Umbrella put together this helpful infographic. Read on for 2019 trends and 2020 predictions.

  • Threat Intelligence Executive Report

    Sponsored by: Dell SecureWorks

    The Secureworks Counter Threat Unit (CTU) regularly conducts research and releases reports related to current developments in threat behaviors and cybersecurity trends. In their most recent Threat Intelligence report, analyze March and April 2020 to discover how COVID-19 shaped the threat landscape, workplace trends, and more.

  • Empower Security Analysts Through Guided EDR Investigation

    Sponsored by: McAfee

    Today’s EDR solutions are often better tailored to larger enterprises – leaving most security teams feeling overwhelmed and at risk. This Forrester report takes a closer look at an emerging EDR trend – guided investigation – which leverages automation to enable greater security, efficiency and scale. Read on to see what Forrester has to say.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.