Network and Endpoint Security - Further Information
This page shows up to 100 pieces of content (newest at the top):
Bloor Research undertook a survey of 370 industrial organisations to ascertain what security measures they are taking to secure their operational technology (OT) networks.
Overcoming the complexity gap - the role of automation in optimising network performance and security
This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...
Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware
The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all stages of the cyber kill chain
The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services
Endpoint security is a pressing concern for all organisations and is an area that is growing in importance.
Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation
This document describes what options are available for disrupting attackers at each stage of the kill chain.
Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.
Attacks cannot be defeated with protective technologies alone, given today's technology and the sophistication of attackers, some attacks will always get through.
Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.
In June 2012, the Monetary Authority of Singapore (MAS) created a new set of guidelines based on Internet Banking and Technology Risk Management (TRM)
Organisations will benefit from investing in security technologies that provide greater insight into activity occurring on both their networks and the systems.
By creating a trusted environment in which only known good applications can run, control is handed back to the IT department.
Architecting the security of the next-generation data centre - Why security needs to be a key component early in the design phase
This document is aimed at those looking at data centre builds, upgrades or consolidation. It provides an introduction to some of the new security challenges of such environments and provides recommendations for implementing security in next-generation dat
Taking back control in today’s complex threat landscape - using application and change control to thwart attackers
The security threats that we face are getting ever more harmful. Attacks launched en-masse are no longer the order of the day.
With cyberattacks escalating and becoming increasingly sophisticated and targeted, the race is on for organisations to ensure that their networks, the sensitive information that they contain and their valuable website resources are protected from compromi
Organisations should investigate the options that are available in terms of an optimised network security platform, with centralised management capabilities and backed up by global threat intelligence services based in the cloud.