Access "Product review: Mandiant Intelligent Response 1.0"
This article is part of the May 2008 issue of Seven questions to ask before committing to SaaS
INCIDENT RESPONSE Mandiant Intelligent Response 1.0 REVIEWED BY PHORAM MEHTA Mandiant Price: $86,500 In recent years, the information security industry has created a tool of some kind or other to address the security concerns of pretty much every single component in an information flow path--from network and application firewalls to antimalware, and from traffic monitoring to log management. In spite of all these tools and layered defenses, security breaches and incidents are part of doing business in the linked-up world. Yet, incident response remains a very manual process that is rife with inaccuracies and inefficiencies, unless you can afford highly prized consultants or even more expensive forensics tools. Typically, the best companies have done to improve their incident response plans is to update the documentation to add some industry best practice steps and perform a table-top testing exercise on a semi-regular basis. IR teams often have to scramble during a virus outbreak or a TJX-type incident to figure out what happened and how to get things back ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
SaaS Offering Handles SSO
TechFocus: New Password Hell?
- Viewpoint: Let's add policy to GRC
-
Product review: CodeArmor 2.2 for Microsoft .NET
APPLICATION SECURITY
-
Security Services: Webroot Email Security SaaS
At Your Service
-
Identity Management Suites Enable Integration, Interoperability
IDENTITY MANAGEMENT Feature-rich product suites are putting a face on integration and interoperability.
-
SaaS Offering Handles SSO
-
-
Secure Computing SafeWord 2008 product review
Secure Computing SafeWord 2008 delivers identity management and access control for Windows systems using tokens that generate secure single-use passcodes. Information Security magazine reviews these capabilities.
-
7 Security Questions to Ask Your SaaS Provider
Outsourcing software as a service (SaaS) puts control over an organization's applications in the hands of others. Learn what questions to ask your provider, how to define security policies, how to understand how service providers handle security and ensure enforcement of policies.
-
Product review: Symantec Database Security 3.1
DATABASE SECURITY
-
5 Steps for Developing Strong Change Management Program Best Practices
Poor change control and configuration management can affect the security of your systems and networks. Follow these five steps for a strong change management program.
-
Product review: Mandiant Intelligent Response 1.0
INCIDENT RESPONSE
-
Secure Computing SafeWord 2008 product review
-
Columns
-
Interview: Jim Kirkhope of NCR
PING: Jim Kirkhope
-
Face-Off: Is vulnerability research ethical?
Bruce Schneier and Marcus Ranum debate the ethics of vulnerability research
-
Reasearch on Coding Backdoors Presents Ugly Picture
Editor's Desk: Backdoor Bedlam
-
Security, Privacy Offices Must Combine Resources
Perspectives: Nowhere to Hide
-
Interview: Jim Kirkhope of NCR
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO