Skip to main content
 

threat detection

Results 1 - 25 of 198Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Align SIEM and SOAR to accelerate response times and reduce analyst workload. By integrating the IBM Resilient SOAR Platform with IBM QRadar® Security Intelligence, security teams can build out a market leading threat management solution that covers the detection, investigation and remediation of threats across a wide range of cyber use cases.
Tags : 
    
Group M_IBM Q4'19
Published By: Trend Micro     Published Date: Aug 07, 2019
As the threat landscape evolves, organizations have accepted the fact that they have to take a more proactive detection approach to advanced threats rather than relying on traditional defenses. As a result, customers have turned to detection and response tools that allow for proactive “hunting” for Indicators of Attack (IoA) and reactive “sweeping” for indicators of compromise (IoCs). Once found, those tools are required to automatically respond to attacks or to at least provide for an action from the Incident Response (IR) staff. Unfortunately, due to the number and complexity of both these attacks and the detection/response tools, organizations struggle to hire enough qualified staff and stay on top of the discovered threats. This is compounded by a worldwide cybersecurity skills shortage. Managed detection and response (XDR) provides advanced threat hunting, detection, and response as a service to organizations that seek assistance for their own IR staff, or for those who wish to o
Tags : 
    
Trend Micro
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: Trend Micro     Published Date: Sep 05, 2019
“EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed.” Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: • Strategic insight into the current state of threat detection and response, providing you with ESG’s comprehensive research and findings. • Current challenges affecting today’s organizations, including the time and resources required and numerous gaps that EDR exposes. • Valuable foresight into what’s next and how XDR—detection and response across email, endpoint, servers, cloud workloads, and network—can help solve these issues.
Tags : 
    
Trend Micro
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Imperva’s WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Imperva’s sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web server’s IP
Tags : 
    
AWS
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to a National Cyber Security Alliance estimate. Yet 68 percent of small business owners in a recent survey seemed oblivious to the threat. Why the disconnect? What should they be doing to protect their business-critical systems and data? How can small businesses wring maximum value from their cybersecurity investments? Where do AI-based endpoint protection, detection, and response platforms fit into the mix? Read this BlackBerry Cylance sponsored white paper, Small Organizations Still Need Big Security, to find out.
Tags : 
    
BlackBerry Cylance
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell EMC EMEA
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks
    
Venafi
Published By: Cisco     Published Date: Mar 17, 2017
The Cisco 2017 Annual Cybersecurity Report presents research, insights, and perspectives from Cisco Security Research. This research can help your organisation respond effectively to today’s rapidly evolving and sophisticated threats.
Tags : 
cyber security, threat and vulnerability management, security, attacks, threat detection
    
Cisco
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks, cyber defense, vpn, dlp, privileged access, authentication systems
    
Venafi
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
This workshop explains and demonstrates how to secure your infrastructure, protect your digital assets, and automate threat detection and incident correction—providing complete visibility into your data center security operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: Secureworks     Published Date: Nov 11, 2016
Sit back and relax while we pull back the curtains and reveal what happens, start to finish, when a threat is detected.
Tags : 
managed security services, threat detection, risk management, cyber security
    
Secureworks
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : 
security, threat and vulnerability management, security, cyber attacks, email, threat detection
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : 
cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
    
Proofpoint
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
    
Dell PC Lifecycle
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.