intel security

Results 401 - 425 of 452Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence
     Proofpoint
By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence
     Q1 Labs
By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
     Rapid7
By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
     Recorded Future
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: RSA Security     Published Date: Oct 24, 2013
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : rsa, emc, security, operations center, threat, threat detection, intelligence-driven
     RSA Security
By: SailPoint Technologies     Published Date: Oct 01, 2019
Find out how government agencies can use machine learning and artificial intelligence to discover and prevent potential cybersecurity gaps and risks. Download the brief.
Tags : 
     SailPoint Technologies
By: SAS     Published Date: Apr 13, 2011
BI usage among organizations with mobile BI has doubled compared to those companies that have not mobilized their BI. Learn about these results, the emerging best practices for mobile BI usage and the framework by which you can assess your own management capabilities for enterprise mobile BI adoption.
Tags : mobile bi, business intelligence, andrew borg, david white, aberdeen, performance management, data management, knowledge management
     SAS
By: SAS     Published Date: Oct 18, 2017
Financial organizations are deploying artificial intelligence and machine learning in the fight against financial crimes. David Stewart, Director of Pre-Sales for the Global Security Intelligence Practice at SAS, offers tips to help separate fact from market hype when reviewing new data analytics tools. You’ll learn about: • The new industry intrigue with artificial intelligence and machine learning. • How these emerging solutions can benefit financial institutions. • The SAS approach of “crawl, walk, run” when it comes to adopting new analytics tools.
Tags : 
     SAS
By: SAS     Published Date: Mar 06, 2018
Known for its industry-leading analytics, data management and business intelligence solutions, SAS is focused on helping organizations use data and analytics to make better decisions, faster. The combination of self-service BI and analytics positions you for improved productivity and smarter business decisions. So you can become more competitive as you use all your data to take better actions. Instead of depending on hunch-based choices, you can make decisions that are truly rooted in discovery and analytics. And you can do it through an interface that anyone can use. At last, your business users can get close enough to the data to manipulate it and draw their own reliable, fact-based conclusions. And they can do it in seconds or minutes, not hours or days. Equally important, IT remains in control of data access and security by providing trusted data sets and defined processes that promote the valuable, user-generated content for reuse and consistency. But, they are no longer forced
Tags : 
     SAS
By: SAS     Published Date: Mar 06, 2018
These emerging technologies and solutions certainly are not unique to financial services. But Stewart, a business director of security intelligence solutions within the SAS Security Intelligence Practice, sees particular interest and application in AML circles. "There remain a good number of manual processes within financial crimes departments in financial institutions, and AI can help automate some of those rote tasks such as document review or alert triage," he says. "Due to investments in technology, there is a lower barrier of entry for midsized institutions. "And finally, there's this anxiety over the unknown - those risks they are not able to detect, that may be hidden using traditional techniques - so they're hoping that more advanced, unsupervised learning techniques can be used to identify those edge cases or behaviors that are out of norm." In an interview about analytics and the AML paradigm shift, Stewart discusses: • The new industry intrigue with artificial intelligence a
Tags : 
     SAS
By: Seagate     Published Date: Jan 27, 2015
This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution, Seagate ClusterStor™ Secure Data Appliance, which is designed to address government and business enterprise need for collaborative and secure information sharing within a Multi-Level Security (MLS) framework at Big Data and HPC Scale.
Tags : 
     Seagate
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: SpectorSoft     Published Date: Jan 23, 2015
This White Paper will present some common sense suggestions for improving the “beginning of the lifecycle” risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we’ll look at how to tie the efforts made at the beginning of the lifecycle to the rest of the employee lifecycle, using a combination of process and tools to significantly improve security, and reduce the chances of an insider incident.
Tags : spectorsoft, risk mitigation, insider threat, background checks, screening process, hiring process, networking, security
     SpectorSoft
By: Splunk     Published Date: Oct 15, 2012
Learn how security professionals are extending the use of Splunk with the Splunk App for Enterprise Security
Tags : enterprise security, data security, enterprise data, database management, security metrics, security, data management, data center
     Splunk
By: Splunk     Published Date: Aug 21, 2018
SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with advanced analytics, threat detection, monitoring tools, incident response tools and multiple forms of threat intelligence. Download your complimentary copy of “The Six Essential Capabilities of an Analytics-Driven SIEM” and learn how to dramatically improve your security posture, advanced threat detection and incident response.
Tags : 
     Splunk
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com