Whitepaper-archief

Laatste onderwerpen:

Market Guide for User and Entity Behavior Analytics

Security and risk management leaders considering UEBA will find that the market has fragmented, with a few pure-play vendors and a wide set of traditional security products that embed core UEBA technologies and features to bene...

Whitepaper bekijken

Networking and Information Systems (NIS) Directive

The EU’s Network and Information Systems (NIS) Directive entered into force in August 2016 with the aim of increasing the resilience of cybersecurity defences across Europe. The clock is now ticking with EU member states having...

Whitepaper bekijken

2017 Threat Report

Cylance® provides security solutions that are focused on protecting endpoints and servers from being compromised by malware, malicious scripts, fileless attacks, and other advanced threats. Through a lightweight endpoint agent...

Whitepaper bekijken

Comprehensive Cybersecurity Defenses for Content Delivery

Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sa...

Whitepaper bekijken

The IT Security Enforcer’s Advisory on Managed Security Services Models and Execution

Security is about protection, and in the enterprise IT environment, that means protection of a burgeoning array of physical and digital objects. Most objects, or property, within an enterprise can also be defined as assets, mak...

Whitepaper bekijken

The Evolving Cybersecurity Landscape in the MECA Region

Tata Communication's Avinash Prasad on Regional Nuances in 2018 Organizations in the Middle East and Central Asia are beginning to respond to the nuances of the evolving threat landscape in the region, says Avinash Prasad,...

Whitepaper bekijken

One Vendor. One Complete Data Protection Solution.

Protect your data everywhere, from physical to virtual to cloud Lower your cost-to-protect and protect more data – from any threat – with cloud-enabled Dell EMC Data Protection solutions powered by Intel® Xeon® processors. Arc...

Infografiek bekijken

Understanding data lakes and security

The cyberthreat landscape has never been more complex and fast moving. This means any new technology that can be used in the fight against cybercrime can bring real value to the security operations centre (SOC). Given how orga...

Whitepaper bekijken

How to build a SOC with limited Resources

The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat L...

Whitepaper bekijken

Machine learning and artificial intelligence in cybersecurity

One of the most common problems for enterprise security teams is how to respond effectively to the sheer volume of alarms they face every day. With so much noise, it can be hard for personnel to filter out false positives and f...

Whitepaper bekijken
Registreer u voor onze nieuwsbrief
Het belangrijkste nieuws gratis via e-mail