skip to Main Content
Cover for How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern

How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern
Published: 29th January 2016 | By:
This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.

Cover for Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation

Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation
Published: 3rd August 2015 | By:
This document describes what options are available for disrupting attackers at each stage of the kill chain.

Cover for AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations

AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations
Published: 8th April 2015 | By:
Organisations will benefit from a unified, coordinated security monitoring capability encompassing many controls and traversing the entire network in a simplified manner.

Cover for Practices for Enhancing Data Security - a survey of organisations in the UK and the US

Practices for Enhancing Data Security - a survey of organisations in the UK and the US
Published: 23rd February 2015 | By:
This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.

Cover for IBM: enhanced 360° view

IBM: enhanced 360° view
Published: 19th October 2014 | By:
This paper briefly considers relevant IBM technologies and solutions in the context of the requirements discussed

Cover for Security intelligence: solving the puzzle for actionable insight

Security intelligence: solving the puzzle for actionable insight
Published: 8th September 2014 | By:
The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent

Cover for The need to protect against file-based attacks - statistical evidence for the need for greater assurance

The need to protect against file-based attacks - statistical evidence for the need for greater assurance
Published: 21st February 2014 | By:
The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.

Cover for Technology evolution & its impact on security - why the endpoint must be the new focus

Technology evolution & its impact on security - why the endpoint must be the new focus
Published: 24th October 2013 | By:
Organisations will benefit from investing in security technologies that provide greater insight into activity occurring on both their networks and the systems.

Back To Top