Issue Overview
Information Security magazine - Special Edition, May 2013Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises have to be nimble on the security front in order to keep data safe and attackers at bay. This Essential Guide will help you understand the latest in threat detection options, from whitelisting and sandboxing, to technologies that help you analyze and correlate attacks such as network monitoring, SIM and log management. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
The evolution of threat detection and management
by Michael Cobb, Application Security
Enterprises must understand the latest threat detection options to keep up with advanced cybercriminals who can bypass enterprise security defenses.
-
The evolution of threat detection and management
by Michael Cobb, Application Security
-
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO