Security Whitepapers


Sort by: Date | Company | Title


A blueprint for detection & response
By LogRhythm | 4/12/2014
Recent highly publicized breaches involving sophisticated attacks and high-profile targets has elevated awareness of Advanced Persistent Threats (APTs) to unprecedented levels. This has left many organizations struggling to understand the risk APTs present to them and how best to protect themselves. For organizations concerned with APTs, and advanced threats in general, SIEM is a critical component of a defense-in-depth architecture.
Download this now


CIO Executive Council Cyber Security Handbook
By CIO Executive Council | 2/12/2014
This handbook has been put together to clearly explain the evolving role of cyber security to anyone in an organisation. You’ll find practical insights and questions you should be asking plus advice on how to transform redundant cyber security approaches into effective ongoing security solutions. •Learn the 11 questions leaders should use to start a conversation with the CIO’s in their organisation •Find out the 10 assumptions commonly that are a danger to implementing adequate security •Plus, get the Cyber Security Checklist which outlines the questions you should be able to answer about your organisation
Download this now


SANS Analytics and Intelligence Survey | 2014
By LogRhythm | 1/12/2014
Of those organizations that are able to detect attacks, more than 23% experienced 2 to 5 breaches or significant attacks in the past two years. Visibility holds the key to improved detection and response capabilities. Organizations need to understand their environment and what constitutes normal and abnormal behavior, train staff on how to use analytic tools and define the data they need to collect.
Download this now


SANS Combining Security Intelligence and the Critical Security Controls
By LogRhythm | 1/12/2014
The Critical Security Controls for Effective Cyber Defense (CSCs) represent an established and solid set of guidelines for the government, financial, education, manufacturing and health care sectors, according to a 2013 SANS survey on the CSCs. SANS had the opportunity to review numerous features of LogRhythm's security information and event management (SIEM) platform with new security intelligence features built in for compliance. In our review, we focused on LogRhythm's ability to ease some of these pain points while meeting 10 of the most valuable CSCs.
Download this now


Frost & Sullivan Market Penetration Leadership Award SIEM/LM Global, 2013
By LogRhythm | 1/12/2014
Frost & Sullivan’s award highlights four key performance drivers that distinguish LogRhythm: Key Features include; Brand Performance, Technical Leadership, Defining the Market for Competitors, and Product Line Depth. Download today to get the full Frost and Sullivan Best Practices Research for SIEM and log management.
Download this now


2014-2015 DCIG SIEM Appliance Buyers Guide
By LogRhythm | 1/12/2014
The Insider’s Guide to Evaluating Security Incident and Event Management Appliances
Download this now


Three key steps to achieving mobile security harmony
By IBM Australia | 28/11/2014
Management and security solutions for mobile devices have grown over the past few years. While these solutions meet basic needs, they have been lacking in more sophisticated security aspects. This whitepaper discusses how to address these gaps: • Understand why you need to define your risk and security goals before looking for solutions • Learn the three main approaches to security applications – container, stripping and virtualization • Why and how you should get educated before you enter into a vendor pitch
Download this now


Infotech Research: Vendor Landscape: Security Information & Event Management (SIEM)
By LogRhythm | 28/11/2014
Info-Tech evaluated ten competitors in the SIEMmarket. For this Vendor Landscape, Info-Tech focused on those vendors that offer broad capabilities across multiple platforms and that have a strong market presence and/or reputational presence among mid and large sized enterprises.
Download this now


Guide to IT Best Practices in Application-Aware Network Performance Management
By Fluke Networks | 28/11/2014
This guide is intended for companies, organizations, and IT professionals who are looking for a network and application monitoring tool that provides a holistic view of application performance, including performance monitoring, from the end-user perspective.
Download this now


The new equation for faster IT problem-solving
By Fluke Networks | 28/11/2014
A new acronym has been defined for the solutions that address this space: Application Aware Network Performance Management (AANPM). Gartner Group has now begun tracking this as a new sector, which they have termed Network Performance Monitoring and Diagnostics, and are developing a Magic Quadrant on the solutions available. This White Paper examines the need for AANPM and how it helps organisations to optimise the performance of business critical applications while speeding up network and application trouble-shooting and minimising downtime.
Download this now
CIO
ARN
Techworld
CMO