security response

Results 1 - 25 of 149Sort Results By: Published Date | Title | Company Name
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Todays cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management, application integration
    
Polycom
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data management, data center
    
Tripwire
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense, it management, knowledge management, data management
    
ThreatTrack Security
Published By: xMatters     Published Date: Feb 04, 2015
Staying on top of cutting-edge communication trends can be the difference in saving lives during a disaster or even preserving customer loyalty by notifying people during a major business interruption. Get the complimentary report written by industry expert Dr. Steven B. Goldman and learn the important trends you need to be aware of in 2015, including: The increase in security budgets, as well as fines and lawsuits The continuing rise in data breaches and malicious cyber attacks The impact of social media on crisis preparations and response Why natural disasters may be the least of your worries And most importantly, how to survive the robot uprising!
Tags : 
security, budgets, disaster, business interruption, social media, data breaches, customer loyalty, communication trends
    
xMatters
Published By: LogRhythm     Published Date: Jun 19, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
siem, gartner, magic, quadrant, analytics
    
LogRhythm
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinets 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Niara     Published Date: Jan 29, 2016
This handy guide, that also includes an evaluation checklist, will help you select one thats right for your organization.
Tags : 
security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics
    
Niara
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
Its practically impossible to be completely prepared for a security incident invariably something happens that best laid plans dont address. But that doesnt mean organizations shouldnt try.
Tags : 
resilient systems, cyber security, incident response, plan, guide, security, data management
    
Resilient Systems, Inc.
Published By: Niara     Published Date: Jan 27, 2016
Download this whitepaper to learn some common myths to consider when deploying security analytics solutions.
Tags : 
security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics
    
Niara
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks Incident Management and Response team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents. This paper is designed to help you ask tough, dir ect questions of any incident response services provider to help you determine the vendors capabilities, and if that vendor represents the best fit based on your organizations particular needs. We highly recommend using the following questions when evaluating any outside assistance with your incident response function.
Tags : 
    
Secureworks
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. The resulting paper reveals the experiences, concerns and future plans of organizations in 12 countries and six continents. It provides deep insight into the day-to-day challenges IT teams face securing their organizations against cyberattacks, as well as their experiences with endpoint detection and response (EDR) technologies.
Tags : 
    
Pine Cove Consulting
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
    
HP
Published By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : 
risk, threat, attack vector, security strategy, security architect, information, continuous response, incident
    
Intel Security
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attackers advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: Dell SecureWorks     Published Date: Sep 13, 2013
Accelerating Incident Response: How Integrated Services Reduce Risk and the Impact of a Security Breach
Tags : 
dell, dell secureworks, security breach, incident response
    
Dell SecureWorks
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logics SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. Youll see how easy it can be to protect and defend against todays threats with all of the essential security tools you need. Experience how USM makes it easy to: Discover all IP-enabled assets on your network Identify vulnerabilities like unpatched software or insecure configurations Detect malware like botnets, trojans & rootkits Speed incident response with remediation guidance for every alert Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot, anti virus
    
Arbor Networks
Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet
    
Arbor
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the worlds leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the worlds leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: Trend Micro     Published Date: Sep 05, 2019
EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed. Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: Strategic insight into the current state of threat detection and response, providing you with ESGs comprehensive research and findings. Current challenges affecting todays organizations, including the time and resources required and numerous gaps that EDR exposes. Valuable foresight into whats next and how XDRdetection and response across email, endpoint, servers, cloud workloads, and networkcan help solve these issues.
Tags : 
    
Trend Micro
Start   Previous   1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.