Facebook iconTwitter icon
B2B-Network:
Loader
Thumb original de defeating threats through user data ueba white paper
UEBA-Technologien überwachen die Daten zu den Benutzeraktivitäten, die mit Protokollen, Audit-Trails und speziellen Sensoren erfasst werden, auf bekannte Bedrohungen und Verhaltensänderungen. Dadur...
Zum Whitepaper
Thumb original uk networking and information systems directive nisd white paper
The NIS Directive provides legal measures that will boost the overall level of cybersecurity in the EU, particularly for industries and organisations that provide services essential to everyday lif...
Zum Whitepaper
Thumb original definitive guide to soar ebook
Cybersecurity organizations have their work cut out for them. As the last line of defense in the fight against cyberthreats, they stand between their corporations’ valuable IT assets and cyberattac...
Zum E-Book
Thumb original de security operations maturity model white paper
Dieses Whitepaper untersucht, wie die wichtigsten Aufgaben eines Security Operations Centers (SOC) bewertet und weiterentwickelt werden können: die Überwachung auf Bedrohungen, das Threat Hunting, ...
Zum Whitepaper
Thumb original de swift white paper
Die Society for Worldwide Interbank Financial Telecommunication (SWIFT) unterstützt tagtäglich zahllose Finanztransaktionen. Die Daten laufen dabei über das sichere Nachrichtensystem, das die SWIFT...
Zum Whitepaper
Thumb original uk defeating user threats with ueba
You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is that your users are behind many threats and breaches — whether maliciously or accidentally. Case...
Zum Whitepaper
Thumb original uk security operations maturity model white paper
This white paper explores how to assess and evolve the principle programmes of the security operations centre (SOC): threat monitoring, threat hunting, threat investigation and incident response. L...
Zum Whitepaper
Thumb original uk swift white paper
Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of financial transactions every day via the secure messaging system it provides to its members. In addi...
Zum Whitepaper
Thumb original uk uws threat hunting 101 white paper
Threat hunting is the process of proactively searching for malware or attackers that reside on your network. The generally accepted method is to leverage a security information and event management...
Zum Whitepaper
Thumb original 106034 v6 ps business continuity pov de de
Disaster Recovery ist in den Köpfen der IT-Verantwortlichen aller Branchen fest verankert. Aber jetzt ist es an der Zeit, die Disaster Recovery in den Ruhestand zu entlassen. Noch nie haben Dat...
Zum Whitepaper