Network IDS Reports

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

IT Decision Checklist: Messaging Security
sponsored by TechTarget Security
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

TechTarget Security

Information Security IT Decision Checklist: Security Information and Event Management
sponsored by ArcSight, an HP Company
EGUIDE: This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

ArcSight, an HP Company

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Imperva

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 08 Feb 2021 | Published: 25 Oct 2019

ServiceNow

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

Unified Security Management: Real-time Threat Detection
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AT&T Cybersecurity

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities
sponsored by IBM
WHITE PAPER: Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal. Read on to learn more.
Posted: 09 Sep 2009 | Published: 01 Sep 2008

IBM

Firewall Solutions for Small Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.
Posted: 14 Aug 2009 | Published: 14 Aug 2009

Cisco Systems, Inc.