threat planning

Results 1 - 10 of 10Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Oct 02, 2019
If you want greater—and earlier—visibility into indicators of security threats like intellectual property theft, compromised accounts, and insider risk, behavioral analytics may be the answer. Download this Gartner Market Guide if you’re considering or planning to integrate User and Entity Behavior Analytics (UEBA) to augment other security solutions or achieve risk-adaptive protection.
Tags : 
    
Forcepoint
Published By: Aventri     Published Date: Oct 02, 2018
This free ebook presents solutions to planners’ three biggest challenges.
Tags : 
    
Aventri
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: DigiCert     Published Date: Jun 19, 2018
Your website is your most important digital asset and so protecting it is as important as ensuring positive cash flow, paying staff salaries and keeping the lights on in the head office. Despite the threats and the importance of website security, IT department organization, goals and technology – their ‘website security architecture’ – is often unfit for the purpose. With correct planning and strong execution, CIOs and CISOs can create a problem-solving, self-aware, agile organization that is better protected against fast-changing threats. This white paper explores the challenges they face and suggests a roadmap for change.
Tags : 
    
DigiCert
Published By: Veeam '18     Published Date: Mar 13, 2018
Disaster recovery (DR) planning has a reputation for being difficult and time consuming. Setting up alternate processing sites, procuring hardware, establishing data replication, and failover testing have been incredibly expensive undertakings. To top it all off, the need for 24x7x365 business application availability threatens to make disaster recovery planning an exercise in futility.
Tags : 
draas, business, applications, planning, business, optimization
    
Veeam '18
Published By: CA Technologies     Published Date: Sep 25, 2017
Several years into the app economy, business has changed. Accelerating product cycles and competitive threats now demand continuous planning. Change is constant and managing it is more important than ever. As a result, companies that for years have taken a traditional approach to managing initiatives are moving rapidly to implement agile business practices. And they’re seeing results, in the form of improved quality, faster delivery of value, reduced development costs and increased customer satisfaction. But this transition also creates new challenges and responsibilities for the project management office (PMO). In fact, the success of the transformation often hinges on the PMO’s ability to expand the underlying concepts of the agile development methodology into a companywide ethos¬—a concept known as business agility.
Tags : 
decision making, strategically, tools, pmo, entrepreneurial spirit, business, ca technologies
    
CA Technologies
Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing
    
ESET
Search      

Add Research

Get your company's research in the hands of targeted business professionals.