133 Results for:Network Security

  • Filter by: 

Dramatically Reduce Incident Response Time with Splunk® and Bro

sponsored by CoreLight Published: 07 Feb 2019 Product Overview

Watch this webcast to learn about open-source network security monitor Bro—now known as Zeek—which turns network traffic into high-fidelity data streams that summarize and organize network events by protocol.

View Now

Thwarting Sophisticated Attacks with Today’s Firewalls

sponsored by SearchSecurity.com Published: 17 Feb 2012 eGuide

This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat ...

View Now

MicroScope – May: Bundles deliver surprise package for SMEs

sponsored by MicroScope Published: 01 May 2018 Ezine

An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

View Now

5 Ways Bro Gives You Better Data for Incident Response and Threat Hunting

sponsored by CoreLight Published: 08 Feb 2019 Webcast

Watch this webcast to learn about Zeek—formally known as Bro—an open-source network security monitor that empowers incident responders and threat hunters to locate and prevent attacks by providing high-fidelity ...

View Now

IT in Europe: Security in the Cloud

sponsored by SearchSecurity.com Published: 26 Aug 2011 Ezine

Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the ...

View Now

IT in Europe: Adopting an Application-Centric Architecture

sponsored by SearchSecurity.com Published: 03 Nov 2011 Ezine

Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how ...

View Now

Addressing Data Security In The Cloud And Low Cost Large File Transfer

sponsored by SearchSecurity.com Published: 10 Oct 2013 eGuide

The location of cloud storage can play a huge part in cost as well as security. Delivering large files from non-scrutinized locations can compromise sensitive data in more ways than not.

View Now

Infosec 2012: How to Help Your Organisation Deal with Next-Generation Cyber-Attacks

sponsored by SearchSecurity.com Published: 22 Apr 2013 eGuide

This E-Guide offers expert insight on how to address next-generation cyber-attacks. View now to learn how network visibility can help you mitigate advanced threats, and much more!

View Now

A Technical Introduction to Bro: Network Security's Best Kept Secret

sponsored by CoreLight Published: 06 Feb 2019 Webcast

Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.

View Now

Windows Server 2012 Security from End to Edge and Beyond

sponsored by ComputerWeekly.com Published: 02 Sep 2013 Book

This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.

View Now