Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

threat feed

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: ArborNetworks     Published Date: Sep 16, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
security, it management
    
ArborNetworks
Published By: McAfee     Published Date: Mar 31, 2017
The OpenDXL initiative puts the power of integration and automation in the hands of security analysts by providing open source tools, expertise, and a supportive community.
Tags : 
opendxl, data exchange, open source, threat feed, threat intelligence, ioc, advanced threats, sandbox
    
McAfee
Published By: IBM     Published Date: Oct 10, 2013
The security world is a scary place, and itís getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, itís becoming more difficult to recruit and retain people who really get it and know how to help. Itís time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbersóand the feedback is overwhelmingly positive.
Tags : 
security, risks, threats, security breach, customer demands, regulations, forrester consulting, ibm
    
IBM
Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention, network security
    
Arbor Networks
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.