ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention White Papers

  • Vendor Portfolios for Secure Web Gateways

    Sponsored by: Netskope

    Vendors are expanding their core secure web gateways (SWG) to add more security features such as CASB, zero-trust network access, FWaaS and remote browser isolation. Download this Gartner Magic Quadrant to examine broader portfolios that may help you consolidate security vendors.

  • 5 Types of Insider Threats and How to Detect Them in Your ERP System

    Sponsored by: Appsian

    Although insider threats are the leading cause of the majority (57%) of data breaches, organizations often overlook these threats and focus their efforts on defending against external attacks. Read this blog post and discover the 5 most common insider threats and how to detect them in your ERP system.

  • Innovation Insight For Extended Detection And Response

    Sponsored by: Palo Alto Cortex

    Disparate risk management teams and security tools make it difficult to efficiently mitigate threats. This Gartner report highlights the risks and advantages of today’s leading extended detect and response (XDR) tools – designed to unify incident detection and response efforts into a single platform.

  • 2020 Threat Hunting Survey Results

    Sponsored by: DomainTools

    Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.

  • Threat Hunting Report

    Sponsored by: DomainTools

    Threat hunting is becoming the gold standard for addressing today’s increasingly disruptive cyberthreats – in fact, 93% of organizations agree that threat hunting should be a top security priority. Read this 2020 Threat Hunting Report for more insights and best practices as they related to the current state of threat hunting.

  • Render Zero-Day Attacks Useless on Your Network

    Sponsored by: Atakama

    Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.

  • Onfido’s Identity Fraud Report 2020

    Sponsored by: Onfido

    Each year, fraudsters find new and more effective ways to benefit from cyberthreats – the pandemic of 2020 made it an especially profitable year for fraudsters. Read this identity fraud research report to learn more about the emerging threat types and most effective security techniques.

  • Detecting a Java Backdoor with Dtex

    Sponsored by: Dtex

    In this case study, see how a financial services company fell victim to a java backdoor attack – despite having AV, EDR and other security tools deployed – and discover how Dtex’s detection and forensic capabilities enabled a complete time of resolution of under 24 hours.

  • Managed Detection and Response (MDR) Services Buyers Guide

    Sponsored by: Sophos

    Managed detection and response (MDR) tools are growing in popularity among security leaders as workloads grow in volume. The following buyers guide highlights the potential benefits and required capabilities of an ideal MDR tool and evaluates current offerings against these features – read on to get started.

  • Security Incident Response & Vulnerability Response: Cost Savings & Other Benefits

    Sponsored by: ServiceNow

    Cyberattacks are occurring at a more frequent rate than ever before – not to mention the increased complexity of today’s threats. To address this, organizations are turning to security operations tools, like ServiceNow’s. Read this Forrester Total Economic Impact report for a closer look at the key features and ROI of ServiceNow’s offering.

  • Hacking Active Directory – From A Pen Tester

    Sponsored by: Quest

    Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.

  • Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria

    Sponsored by: Cysiv

    SOCs are a critical aspect to effectively identifying and addressing potential threats – however the evaluation process and subsequent RFP drafting process can be overwhelming with the amount of available options. The following white paper provides evaluation best practices and tips to guide RFP drafting to help you get started.

  • Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider

    Sponsored by: GoSecure

    According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner report to learn what these questions are and more.

  • 5 Steps to Making Better Security Decisions

    Sponsored by: ThreatQuotient

    The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.

  • IDC Technology Spotlight

    Sponsored by: GoSecure

    In order to address the increasing frequency (and efficacy) of malware attacks, organizations have begun embracing managed detection and response (MDR) tools. This report provides an overview of MDR required capabilities, emerging trends and a closer look at the key features and capabilities of the GoSecure MDR Platform.

  • Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient

    Sponsored by: ThreatQuotient

    How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.

  • Cybereason EDR

    Sponsored by: Cybereason

    Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.

  • Complete Endpoint Protection

    Sponsored by: Cybereason

    In today’s fast-paced and increasingly distributed business environment, protecting the growing population of endpoints from cyberthreats has become increasingly challenging. In this data sheet, discover the key capabilities of Cybereason’s endpoint protection platform and see if it aligns with your endpoint security strategy.

  • Measuring the ROI of an Incident Response Platform

    Sponsored by: Palo Alto Networks

    A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.

  • The 2020 State of Security Operations

    Sponsored by: Palo Alto Networks

    A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.

  • XDR: Extended Detection and Response

    Sponsored by: Palo Alto Networks

    Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.

  • Measuring the ROI of Security Orchestration and Response Platforms

    Sponsored by: Splunk

    Security orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.

  • The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation

    Sponsored by: Palo Alto Networks

    Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.

  • Cybereason MDR Packages

    Sponsored by: Cybereason

    Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.