54 Results for:Security Tools

  • Filter by: 

Containers: Making security and business sense

sponsored by ComputerWeekly.com Published: 21 Aug 2018 eGuide

In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from ...

View Now

Strategies for Securing Highly Scalable Containerized Environments

sponsored by Twistlock, Inc. Published: 07 Aug 2018 White Paper

In this white paper, find out how your organization can take a new approach to security in a containerized environment.

View Now

Security Orchestration, Automation and Response (SOAR) Buyer's Guide

sponsored by Swimlane Published: 18 Dec 2018 White Paper

In today's complex computing environments, it can be hard to determine what actual security coverage is in place. Finding skilled security analysts is an increasingly difficult task. Each year as threats grow, ...

View Now

E-Guide: How to build a toolset to avoid Web 2.0 security issues

sponsored by SearchSecurity.com Published: 17 Sep 2010 eGuide

Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other ...

View Now

Measuring ROI in SOAR

sponsored by Swimlane Published: 17 Oct 2018 White Paper

Learn how your organization can enhance its ROI measuring capabilities, track mean time to resolution (MTTR), maximize staff efficiency and optimize your security tools with this security automation, orchestration ...

View Now

The Power of Bro and Why You Should Include It in Your Security Infrastructure

sponsored by CoreLight Published: 11 Feb 2019 Video

Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight explain the power of Bro (now known as Zeek), where it fits in the security landscape and how it can help incident responders do ...

View Now

11 Limitations of Network-Centric Security In The Cloud

sponsored by Lacework Published: 24 Sep 2018 Resource

Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report ...

View Now

Mobile security moving to a unified approach

sponsored by ComputerWeekly.com Published: 28 Feb 2018 eGuide

This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which ...

View Now

CW buyer's guide: context-aware security

sponsored by ComputerWeekly.com Published: 29 Apr 2013 Essential Guide

This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.

View Now

2012 Security Outlook

sponsored by ComputerWeekly.com Published: 24 Feb 2012 Essential Guide

This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.

View Now