threat detection

Results 101 - 125 of 189Sort Results By: Published Date | Title | Company Name
By: Palo Alto Networks     Published Date: Feb 24, 2016
The threat landscape has evolved and the traditional approach to endpoint security cannot keep up. Detection/response is not an acceptable approach. There are a number of approaches to prevent threats on the endpoint and their ability to prevent unknown and zero-day threats varies widely. Join this webinar featuring a guest speaker from Forrester where we will discuss the findings from a recent commissioned survey they conducted that evaluates these approaches and illustrates that exploit prevention and integration with a network security platform are must-have capabilities. Forrester will also summarize their recommendations for prevention of advanced threats on the endpoint.
Tags : security, endpoint, zero day exploit, forrester, phishing, ddos
     Palo Alto Networks
By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection
     Logrhythm
By: Logrhythm     Published Date: Feb 24, 2016
This eBook looks at different threat sharing initiatives and alliances as well as explores how automating intelligence sharing will significantly accelerate detection and response times.
Tags : cyberthreat, cyberthreat intelligence, security, it solutions, cti companies, cti intelligence
     Logrhythm
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : security, bios, threat prevention, threat detection, malware, hacking
     HP Software
By: IBM     Published Date: Jan 15, 2016
How can your organization better prepare for a security incident?
Tags : ibm, cyber security, threats, precaution, detection, security, enterprise applications
     IBM
By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : alienvault, security, siem, hacking, threat detection
     AlienVault
By: AlienVault     Published Date: Aug 13, 2015
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : alienvault, security, soc, hacking, threat detection
     AlienVault
By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : alienvault, security, siem, hacking, threat detection
     AlienVault
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management
     AlienVault
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection
     AlienVault
By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : security operations center, soc, threat detection, soc tools, siem event correlation, security management, behavior monitoring, threat assessment, asset management, breach prevention
     AlienVault
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks
     Venafi
By: Vectra Networks     Published Date: Aug 03, 2015
Protect prominent securities.
Tags : firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt
     Vectra Networks
By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : data, security, threats, protection, advanced threat, ips, ids, firewall, antivirus
     Vectra Networks
By: Cisco     Published Date: Jul 10, 2015
Today’s multivector and persistent threats, fluid IT environments, and increasing user mobility are prompting more organizations to seek NGFW capability that provides affordable and effective layered threat protection.
Tags : security, ngfw, firewall, threat detection, technology, smd, midisized
     Cisco
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
     Cisco
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
     Cisco
By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks, cyber defense, vpn, dlp, privileged access, authentication systems
     Venafi
By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : ibm, malware detection, cybercrime prevention, it security solutions, security, enterprise applications
     IBM
By: Cisco     Published Date: Mar 03, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking. At the same time, the Internet of Everything (IoE) is accelerating. Opportunities are opening up for businesses and attackers alike as more things come online, along with the people, processes, and data that interact with them.
Tags : security, detection, blocking, data, data management
     Cisco
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com