ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention White Papers

  • Stopping Zero Days at The Speed of Digital

    Sponsored by: Checkpoint Software Technologies

    Most organizations are ill-equipped to handle the threat of zero-day cyberattacks. This e-book, Stopping Zero Days at The Speed of Digital, highlights 3 best practices that can help organizations better identity and mitigate these threats without compromising productivity – read on to get started.

  • SIG - Axcess Financial Customer Story

    Sponsored by: Cisco Umbrella

    In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.

  • The Role of Insider Threat Management Software Platforms

    Sponsored by: Proofpoint

    As workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.

  • Insider Threat Management and Cybersecurity Tools

    Sponsored by: Proofpoint

    The traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.

  • An Overview of Insider Threat Management

    Sponsored by: Proofpoint

    The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.

  • A Guide to Setting Up Your Insider Threat Management Program

    Sponsored by: Proofpoint

    In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.

  • Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign

    Sponsored by: Bitdefender

    Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.

  • Dynamic Data Protection

    Sponsored by: Forcepoint

    The following solution brief provides an inside look into Forcepoint Dynamic Data Protection, which combines behavior analytics with data protection capabilities to enable your organization to prioritize high-risk activity and automate policies – ensuring security without sacrificing productivity. Read on for an overview of the key features.

  • Faster Threat Detection and Response with Data Science and Next-gen SIEM

    Sponsored by: Cysiv

    Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.

  • DataVisor Scales Multicloud Security & Compliance for Customers

    Sponsored by: Lacework

    In this case study, discover how DataVisor, a rapidly growing organization that offers AI-based fraud detection and risk management, was able to ensure security, productivity and compliance across their expanding multicloud environment.

  • Unlock the Value of Your AWS CloudTrail Data

    Sponsored by: Lacework

    As business environments become increasingly complex, threat detection becomes a daunting task. To help overburdened security analysts, Lacework designed a platform to detect anomalies and potential threats within your network, providing you with contextual behavioral analytics. Download this solution brief to learn more about the platform.

  • Light Agent or Agentless

    Sponsored by: Kaspersky Lab

    Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.

  • Transforming Detection and Response: A SANS Review of Cortex XDR

    Sponsored by: Palo Alto Networks

    Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.

  • Stop targeted attacks and data loss on Exchange

    Sponsored by: Armorblox

    While email is rapidly moving towards the cloud, most organizations opt for on-premise or hybrid deployments. Unfortunately, cloud-based email security solutions are often ill-equipped to protect hybrid inboxes. Download this solution brief to learn more about a cloud email security platform designed to stop targeted attacks and data loss.

  • Managed Detection and Response (MDR+)

    Sponsored by: BlueVoyant

    As threat detection, isolation and mitigation becomes increasingly complex, organizations look to third-party vendors for managed detection and response tools and capabilities. This solution brief highlights the key capabilities of at BlueVoyant’s Managed Detection and Response (MDR+) for Microsoft Defender ATP – read on to unlock the features.

  • MITRE ATT&CK Framework Q&A with Forrester Research

    Sponsored by: Capsule8

    In response to the growing popularity and adoption of the MITRE ATT&CK framework, John Zelonis, principal analyst at Forrester Research, provides answers to commonly asked questions and offers further insight into the MITRE ATT&CK framework, including: Who should use the framwork, where priorities should begin & how it falls short.

  • Cybersecurity Evolved: The Sophos Business Impact

    Sponsored by: Sophos

    Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.

  • The Rise of Enterprise Ransomware

    Sponsored by: Sophos

    Ransomware attacks have recently seen a pattern shift towards larger enterprises – but why? This white paper further examines the ransomware threat landscape, including key threats to keep an eye on and critical security technologies organizations should include to protect themselves.

  • How Capsule8 Protects Containerized Environments

    Sponsored by: Capsule8

    When it comes to containerized environments, it’s often thought that isolation equals security. This isn’t the case – if the host is compromised, then the hacker can access any container on the host. Download this solution brief to learn more about how Capsule8 protects containerized environments from runtime threats to security and performance.

  • MITRE ATT&CK Evaluations — APT29

    Sponsored by: Trend Micro

    In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.

  • How the Cognito platform replaces IDS and enables organizations to detect intrusions again

    Sponsored by: Vectra AI

    While intrusion detection systems (IDS) and intrusion prevention systems (IPS) have long been a staple in incident response strategies, the modern threats that target today’s organizations require a new approach – perhaps one that leverages automation an AI. Read this white paper for more about defining the next generation of IDS.

  • Market Guide for Network Detection and Response

    Sponsored by: Vectra AI

    In this Gartner report, take a closer look at the crowded network detection and response (NDR) market, and discover an overview of current offerings, key vendors, and strategic recommendations. Read on to get started.

  • The Ransomware-as-a-Service Evolution Is Here, with Its Sights on Your Mainframe

    Sponsored by: BMC

    The latest iteration of ransomware, known as Ransomware-as-a-service (RaaS), provides hackers with access to ransomware resources in exchange for sending a portion of each ransom to the malware programmer. So, what proactive steps can organizations take against ransomware groups? Read this white paper to find out.

  • Indicators of Compromise and Why It Takes Six-Plus Months to ID a Breach

    Sponsored by: BMC

    Each year, cybercriminals find novel ways to bypass existing security measures and disrupt workflows. In order to effectively protect sensitive data, security approaches need to be an endless, ongoing effort as well. But identifying the indicators of an attack or compromise is tricky. Download this white paper for tips to get started.

  • Why IDS is Ineffective for Linux Production Environments

    Sponsored by: Capsule8

    While intrusion detection systems (IDS) may have been a core component in traditional security strategies, they lack the scalability, agility and visibility to keep up with today’s fast-paced cyberattacks. Download this white paper to discover 9 ways IDS in no longer a viable security option and how to detect threats in modern environments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.