ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • Complete and Differentiated Managed Endpoint Detection and Response Services with Ensilo

    Sponsored by: enSilo

    The market for managed endpoint security services is both changing and growing. Providers are moving beyond traditional managed security services and offering services that protect against advanced threats. In this resource, learn how with enSilo, MSSPs can provide more effective and faster security.

  • Red Cloak Threat Detection & Response

    Sponsored by: Dell SecureWorks

    Security environments are now frustratingly fragmented. Even the most modern security stacks are a varied mix of vendors and tools. In this resource, learn how with Red Cloak Threat Detection & Response you can take security into your own hands and transform the way your security analysts detect, investigate and respond to threats.

  • Real-Time Automated Endpoint Security

    Sponsored by: enSilo

    enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.

  • Access & Protect Your Data – Anywhere, Anytime

    Sponsored by: TITUS

    The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.

  • Five Myths of Network Security in a Hybrid Infrastructure

    Sponsored by: Trend Micro, Inc.

    Not surprisingly, the transition to a hybrid infrastructure is creating confusion among both security professionals and vendors regarding where security controls should be deployed. In this white paper, explore 5 myths about the need for traditional network security in a hybrid infrastructure.

  • Beginner's Guide to Open Source Intrusion Detection Tools

    Sponsored by: AT&T Cybersecurity

    Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.

  • Security Operations Center: Build It Or Buy It

    Sponsored by: Armor

    Organizations have come to realize the only way to protect their networks around the clock is with a security operations center (SOC). This white paper can help you decide whether to build or buy a SOC by exploring the staffing, technology, and costs required to operate a successful SOC.

  • Armor File Integrity Monitoring (FIM)

    Sponsored by: Armor

    When traditional firewalls or IDS fail to prevent or detect a threat, monitoring operating system and application changes at the host level provides an additional layer of security. In this white paper, learn more about Armor's File Integrity Monitoring which watches your hosts for unauthorized activities to detect potential threats.

  • Security Orchestration, Automation and Response (SOAR) for MSSPs

    Sponsored by: Swimlane

    Success and growth in the MSSP business requires balancing the delivery on multiple customer service level agreements (SLAs) with cost-effective operations. But, advances in SOAR offer MSSPs a number of ways to meet SLAs, improve response times and deliver better security. In this white paper, learn more about the potential of SOAR for MSSPs.

  • Endpoint Protection Plus Webinar

    Sponsored by: Ziften

    Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.

  • 8 Real-World Use Cases for Security Orchestration, Automation and Response (SOAR)

    Sponsored by: Swimlane

    Security operations present an escalating series of management challenges. However, SOAR platforms can help security teams automate tasks and aggregate data. This allows security teams to handle more tasks while decreasing mean times to resolution. In this white paper, explore 8 real-world uses cases for SOAR platforms.

  • Security Orchestration, Automation and Response (SOAR) Capabilities

    Sponsored by: Swimlane

    Cybersecurity is a high-wire act, with significant challenges tied to both technology and operations. Protecting digital assets requires the right tools and processes. One way to handle the growing workload is by using SOAR platforms. In this e-book, review what it takes for a SOAR platform to be successful.

  • Faster Response With Crowdstrike and MITRE ATT&CK™

    Sponsored by: CrowdStrike

    As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.

  • Security Information and Event Management (SIEM) Solutions

    Sponsored by: Rapid7

    As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.

  • How to Get Started with the NIST Cybersecurity Framework

    Sponsored by: Expel

    The NIST Cybersecurity Framework can be very useful to help companies understand where they are and where they are going as they grow their broader cyber risk management program. In this white paper, Expel shares how using their Expel service has helped their CSF scores. Also learn how Expel can help you on the road to CSF nirvana.

  • Evaluating Endpoint Protection Platforms

    Sponsored by: CrowdStrike

    Endpoint protection is evolving to address more of Gartner's adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. In this research report, explore Gartner's magic quadrant which includes top vendors along with strengths and cautions for each.

  • Endpoint Detection and Response

    Sponsored by: CrowdStrike

    This Forrester Wave report evaluates Endpoint Detection and Response (EDR) providers. It also shows how different provides measure up and includes key takeaways from the research. Download the report, to discover the top 12 vendors based on a 20-criteria evaluation.

  • The Essential Guide To Fraud

    Sponsored by: Splunk

    Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.

  • The SIEM Buyer's Guide

    Sponsored by: Splunk

    Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.

  • 4 Reasons to Add UBA to Your SIEM

    Sponsored by: Splunk

    To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.

  • Endpoint Zero Trust Protection in a Connected World

    Sponsored by: AppGuard

    In this resource, discover the security capabilities of AppGuard and how your organization could benefit from its zero-trust protection strategy.

  • Managed Detection and Response vs. Managed Security Services: The Difference and How to Choose

    Sponsored by: MASERGY

    The world of managed security services is expanding with Managed Detection and Response (MDR) services. This new approach is designed to accelerate threat discovery and response time, but what is MDR? How is it different from managed security service providers (MSSPs)? In this white paper, learn about the differences between MDR and MSSPs.

  • Bridging Cybersecurity Gaps with Managed Detection and Response

    Sponsored by: Trend Micro, Inc.

    Managed detection and response (MDR) enables a proactive approach to security with its ability to detect and fully analyze threats and promptly respond to incidents. With the complexity of today's threats the stakes are high. In this resource, look at how MDR can face cybersecurity challenges.

  • Security Investigation, Detection & Rapid Response with Splunk Enterprise

    Sponsored by: Splunk

    Investigation and rapid response is critical for day-to-day alert handling. The faster a threat and its impact can be detected and investigated, the faster an organization can take action. In this white paper, learn about how the Splunk platform enables organizations to understand their potential security threats and take the necessary actions.

  • Operationalizing Threat Intelligence Using Splunk® Enterprise Security

    Sponsored by: Splunk

    Threat intelligence can provide critical security perspectives needed to inform an organization about current threats and to help develop a strategy against future threats. In this white paper, learn about the challenges and requirements of implementing high-coverage threat intelligence.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.