64 Results for:Security Tools

  • Filter by: 

The Power of Bro and Why You Should Include It in Your Security Infrastructure

sponsored by CoreLight Published: 11 Feb 2019 Video

Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight explain the power of Bro (now known as Zeek), where it fits in the security landscape and how it can help incident responders do ...

View Now

Measuring ROI in SOAR

sponsored by Swimlane Published: 17 Oct 2018 White Paper

Learn how your organization can enhance its ROI measuring capabilities, track mean time to resolution (MTTR), maximize staff efficiency and optimize your security tools with this security automation, orchestration ...

View Now

E-Guide: How to build a toolset to avoid Web 2.0 security issues

sponsored by SearchSecurity.com Published: 17 Sep 2010 eGuide

Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other ...

View Now

CW buyer's guide: context-aware security

sponsored by ComputerWeekly.com Published: 29 Apr 2013 Essential Guide

This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.

View Now

eGuide: Information Security - Buyer's Guide to Messaging Security

sponsored by SearchSecurity.com Published: 20 Nov 2009 eGuide

Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on ...

View Now

Mobile security moving to a unified approach

sponsored by ComputerWeekly.com Published: 28 Feb 2018 eGuide

This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which ...

View Now

Containers: Making security and business sense

sponsored by ComputerWeekly.com Published: 21 Aug 2018 eGuide

In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from ...

View Now

Security Orchestration, Automation and Response (SOAR) Buyer's Guide

sponsored by Swimlane Published: 18 Dec 2018 White Paper

In today's complex computing environments, it can be hard to determine what actual security coverage is in place. Finding skilled security analysts is an increasingly difficult task. Each year as threats grow, ...

View Now

2012 Security Outlook

sponsored by ComputerWeekly.com Published: 24 Feb 2012 Essential Guide

This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.

View Now

A Computer Weekly buyer's guide to Threat Management

sponsored by ComputerWeekly.com Published: 05 Apr 2019 eGuide

Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's ...

View Now