RSS feed Get our RSS feed

News by Topic

threat intelligence

Results 151 - 175 of 236Sort Results By: Published Date | Title | Company Name
By: Dell SonicWALL     Published Date: Nov 28, 2012
The Impact of Attacks on Your Bottom Line
Tags : firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
     Dell SonicWALL
By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: Juniper Networks     Published Date: Oct 20, 2015
The SRX Series features a carrier-grade next-generation firewall with layered security services such as application security, unified threat management (UTM), integrated IPS, and advanced integrated threat intelligence to guard against cyber threats and malware.
Tags : juniper, network, srx, gateway, reliability analysis, firewall, threat management, storage
     Juniper Networks
By: McAfee     Published Date: Nov 20, 2014
This paper is the result of a recent SANS survey exploring the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Tags : siem, threat intelligence, platform integration, correlation and analysis, third-party intelligence tools, security
     McAfee
By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : siem, data storage, event analysis, attacks, forensic analysis, security
     McAfee
By: McAfee     Published Date: Oct 28, 2014
SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.
Tags : siem, incident response, ir capabilities, ir obstacles, threat intelligence, detection and remediation, data breach, security
     McAfee
By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
     Secureworks
By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
     Juniper Networks
By: McAfee     Published Date: Mar 31, 2017
The concept of SIEM orchestration provides immediate, automated responses. It is the only way for a modern enterprise to protect against advanced attacks.
Tags : secops, siem, soc, orchestration, threat intelligence, epo, automation, process integration
     McAfee
By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : security information, event management, orchestration, surface, intel security
     McAfee EMEA
By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
     Akamai Technologies
By: IBM     Published Date: Aug 08, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : fraud prevention, malware detection, threat intelligence, cybercrime, technology
     IBM
By: OpenDNS     Published Date: Mar 31, 2015
"Security solutions are getting more sophisticated, but so are the advanced threats that you are up against. While businesses have the power to gather more intelligence from more sources, it can be difficult to share that intelligence and apply enforcement on any device, anywhere, anytime."
Tags : 
     OpenDNS
By: Recorded Future     Published Date: Feb 13, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
     Recorded Future
By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security
     Splunk
By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : akamai, state of the internet, security, security report, cybersecurity, ddos, analytics
     Akamai Technologies
By: IBM     Published Date: Oct 02, 2015
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : ibm, global threat intelligence, automated protection, web fraud, threat protection, security
     IBM
By: IBM     Published Date: Jan 07, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : ibm, threat, global threat intelligence, protection, security
     IBM
By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : ibm, threat management, global threat intelligence, automated processes, web fraud, security
     IBM
By: IBM     Published Date: Jul 15, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : best practices, business intelligence, ibm, finance, automated protection
     IBM
By: Cisco EMEA     Published Date: Mar 05, 2018
The Cisco® Incident Response team is led by elite security specialists who can uncover the source of threats by analyzing and synthesizing intelligence from multiple sources. These sought-after specialists consistently deliver resolution in a shorter timeframe, returning businesses like yours to normal. Fast. To find out more about Cisco Incident Response Services download this whitepaper today.
Tags : security, research, analyze, investments, cisco
     Cisco EMEA
By: McAfee     Published Date: Jul 24, 2013
Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Tags : siem, big security data, security information, advanced threats, security intelligence, security
     McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics