ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • Building a High-Speed SOC

    Sponsored by: VMware International Unlimited Company

    87% of organizations today feel it’s difficult to recruit and hire cybersecurity talent. The effects of this skills gap are obvious: security teams will be unable to keep pace with the growing volume of threats. In this white paper, discover how the right balance of skilled workers, processes and technology can produce an effective SOC.

  • Hunt Like a Pro: A Threat Hunting Guide

    Sponsored by: VMware International Unlimited Company

    Threat hunting is a proactive process of scanning the network for potential threats, isolating them and thwarting the malicious behavior before it gets a chance to spread. The goal is to tilt the advantage from the attacker back to the defender. Read this white paper to uncover the best practices necessary to get started hunting threats.

  • VMware Carbon Black Cloud Enterprise EDR

    Sponsored by: VMware International Unlimited Company

    In this datasheet, explore the key features and capabilities of VMware Carbon Black Enterprise EDR, designed to deliver continuous visibility for top security operations centers (SOCs) and incident response (IR) teams as they hunt for threats.

  • VMware Carbon Black Cloud Managed Detection Monitoring and Alert Triage

    Sponsored by: VMware International Unlimited Company

    Today’s security teams are often understaffed and spend too much of their time on tedious, manual tasks. This prevents them from tending to other security areas and slows threat response. In this data sheet, explore VMware Carbon Black Cloud Managed Detection, designed to help by automating some of these tasks. Read on to learn more.

  • Advantage, Network Metadata: How to Enhance Efficiency in Incident Investigations Without PCAP

    Sponsored by: Gigamon

    For a long time network security teams have relied on using packet captures (PCAPs) as the go-to approach for incident investigation. Yet, PCAP can be slow, labor intensive and inefficient. Read this new technology brief and discover how to enhance investigation efficiency without using PCAP by leveraging the advantages of metadata capture.

  • Next-Gen Intrusion Detection: Complementing Perimeter Protection to Secure the Virtual Attack Surface

    Sponsored by: Accedian

    Learn about next-gen IDS technology and how it adds another layer of protection to the enterprise SecOps arsenal to not only protect against illicit network intrusions and behaviors, but to implement active measures to catch cybercriminals in the act.

  • 2019 Crowdstrike Global Security Attitude Survey

    Sponsored by: CrowdStrike

    In today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • The Benefits of Automating Security with SOAR Tools

    Sponsored by: ServiceNow

    Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.

  • How to Improve Your Security Incident Response Process

    Sponsored by: ServiceNow

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

  • Incident Response: Your How-To Guide

    Sponsored by: Farsight Security

    As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.

  • A Look Inside Financially Motivated Attacks and the Active FIN8 Threat Group

    Sponsored by: Gigamon

    Download this report to explore a detailed view into the inner workings of financially motivated threat actor groups, including their preferred tactics and tools. Gaining an understanding of the anatomy of these attacks can help your team to improve visibility into the threats and expedite rapid detection and response.

  • Security Analytics for Threat Detection and Breach Resolution in 2019

    Sponsored by: Gigamon

    While there is no security silver bullet, security analytics is a great step forward for any organization to improve its ability to detect threats. In this white paper, explore the top 4 considerations for investigating a security analytics tool.

  • Faster Response with Crowdstrike and MITRE ATT&CK

    Sponsored by: Crowdstrike

    As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.

  • Explore the ROI of CylancePROTECT and CylanceOPTICS

    Sponsored by: BlackBerry

    To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.

  • 4 Reasons to Add UBA to Your SIEM

    Sponsored by: Splunk

    To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.

  • What to Look for in an MDR Provider

    Sponsored by: Dell SecureWorks

    There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.

  • Operationalizing Threat Intelligence Using Splunk Enterprise Security

    Sponsored by: Splunk

    Explore the challenges and requirements of implementing high-coverage threat intelligence, and how your organization can achieve operational maturity.

  • How to Prevent Cloud Cryptojacking Attacks on your Enterprise

    Sponsored by: Cisco Umbrella

    Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • The Future of Security: Advanced Security Analytics

    Sponsored by: LogRhythm, Inc.

    As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.

  • Information Security Asean July 2016

    Sponsored by: SearchSecurity.com

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Information Security ANZ March 2016

    Sponsored by: TechTarget ANZ

    Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly

  • Information Security ANZ July 2015

    Sponsored by: TechTarget ANZ

    Analysts and security experts discuss the current risk factors in the ANZ region.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.