ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • Why Behavior-Based Network Traffic Analysis (NTA) Matters

    Sponsored by: IronNet

    Today’s security executives are looking to shore up their defenses with a more proactive approach — one that can signal unknown threats steps ahead of the impact. Behavioral analytics adds that level of sophistication to network traffic analysis (NTA). Learn how NTA can elevate your threat detection strategy overall.

  • ThreatQ for Government Agencies

    Sponsored by: ThreatQuotient

    As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • The Benefits of Automating Security with SOAR Tools

    Sponsored by: ServiceNow

    Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.

  • How to Improve Your Security Incident Response Process

    Sponsored by: ServiceNow

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

  • Incident Response: Your How-To Guide

    Sponsored by: Farsight Security

    As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.

  • MDR Buyer's Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Managed detection and response (MDR) is an increasingly popular approach that addresses security monitoring challenges, as it delivers real-time, 24/7 managed detection and response using a holistic, turnkey approach. Download this buyer's guide for key features you should look for in an MDR service.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • Faster Response with Crowdstrike and MITRE ATT&CK

    Sponsored by: Crowdstrike

    As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.

  • Explore the ROI of CylancePROTECT and CylanceOPTICS

    Sponsored by: BlackBerry

    To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.

  • Access & Protect Your Data – Anywhere, Anytime

    Sponsored by: TITUS

    The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.

  • 4 Reasons to Add UBA to Your SIEM

    Sponsored by: Splunk

    To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.

  • What to Look for in an MDR Provider

    Sponsored by: Dell SecureWorks

    There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.

  • How to Protect Privileged Accounts with an Incident Response Plan

    Sponsored by: Thycotic

    Today, cybercriminals can create a blueprint of the entire network and operations. Discover the telltale indicators you're under attack and the plans you need to have in place to protect your privileged accounts.

  • Operationalizing Threat Intelligence Using Splunk Enterprise Security

    Sponsored by: Splunk

    Explore the challenges and requirements of implementing high-coverage threat intelligence, and how your organization can achieve operational maturity.

  • How to Prevent Cloud Cryptojacking Attacks on your Enterprise

    Sponsored by: Cisco Umbrella

    Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • The Future of Security: Advanced Security Analytics

    Sponsored by: LogRhythm, Inc.

    As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.

  • Information Security Asean July 2016

    Sponsored by: SearchSecurity.com

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Information Security ANZ March 2016

    Sponsored by: TechTarget ANZ

    Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly

  • Information Security ANZ July 2015

    Sponsored by: TechTarget ANZ

    Analysts and security experts discuss the current risk factors in the ANZ region.

  • Five Critical Steps to Achieving an Effective Application Security Program

    Sponsored by: IBM

    Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.

  • Intrusion Detection and Prevention: Decision Time

    Sponsored by: SearchSecurity.com

    Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.

  • Intrusion Detection and Prevention: RFP Technology Decisions

    Sponsored by: SearchSecurity.com

    To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.