secops

Results 1 - 25 of 36Sort Results By: Published Date | Title | Company Name

How to Secure Your Containerized Infrastructure on AWS Cloud

Published By: AWS     Published Date: Jun 03, 2019
Background How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS

How to Secure Your Containerized Infrastructure on AWS Cloud

Published By: AWS     Published Date: Oct 07, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS

How to Secure Your Containerized Infrastructure on AWS Cloud

Published By: AWS     Published Date: Oct 09, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS

SecOps For Dummies

Published By: BMC     Published Date: Nov 19, 2018
In this book, you learn how SecOps can transform your organizationís security and operations teams to enable a more effective enterprise security posture.
Tags : 
bmc, bmc software, secops, security operations, cyberattacks, cyber criminals, hacking, data breach, network security, hacker detection, intrusion prevention, risk management, data protection, vulnerability management, data loss prevention
    
BMC

SecOps for Dummies Guide

Published By: BMC ASEAN     Published Date: Jan 02, 2019
Bring security and operations together to protect your organization! Collaborative workflow processes that eliminate friction between security and operations teams sharply lower the risk of data breaches and operational downtime. Enterprises can advance their business agenda by minimizing communications breakdowns that leave the organization vulnerable to cyberattacks. This book shows you how!
Tags : 
    
BMC ASEAN

Gartner 2019 Magic Quadrant for Application Security Testing

Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx

Learn How You Can Fuel Innovation and Streamline Security

Published By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls canít scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it ďearly and often,Ē can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, itís now no longer an obstacle to velocity, innovation and competitiveness. Instead, itís an asset.
Tags : 
application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cio, ciso, appsec
    
Cybric

Learn How a Transformative CIO Accelerated DevOps Adoption by Embedding Security into the SDLC

Published By: Cybric     Published Date: Oct 30, 2017
Committed to advancing brain research, The Dana Foundation needed to transition to the cloud to drive efficiency and more effectively manage risk. With this shift, Dana moved from waterfall development to DevOps but still needed to maintain its strict security posture. In this case study Jim Rutt, CIO of The Dana Foundation, discusses his use of the CYBRIC continuous application security platform to move to DevOps, embedding security earlier in the development process and gaining full security visibility across the SDLC.
Tags : 
cybersecurity, cyber security, cio, application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cloud security, transformation
    
Cybric

Gartner Research Note on Security Trends

Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartnerís research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organizationís exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon

Gartner Research Note on Security Trends

Published By: Gigamon     Published Date: Oct 25, 2017
Read Gartnerís research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organizationís exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon

SANS Whitepaper: Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon

SANS Whitepaper: Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon

Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon

SANS Whitepaper: Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Feb 20, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security
Tags : 
    
Gigamon

Gartner Report: Align NetOps and SecOps Tool Objectives with Shared Use Cases

Published By: Gigamon     Published Date: Feb 21, 2019
Download the latest Gartner report Align NetOps and SecOps Tool Objectives with Shared Use Cases and see why your NetOps and SecOps teams need to unite. The research looks at opportunities to create a faster, more secure network by strengthening crossfunctional communications and improving toolset usage. Learn how sharing tools, skillsets, common goals and best practices can result in a higher-performance network with reduced overhead and an optimized budget with less waste.
Tags : 
    
Gigamon

Gartner Report: Selecting the Right SOC Model for Your Organization

Published By: Gigamon     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
    
Gigamon

ESG Economic Validation: Analyzing the Benefits of Gigamon

Published By: Gigamon     Published Date: Apr 10, 2019
Download ESGís Economic Validation Report, ďAnalyzing the Economic Benefits of Gigamon,Ē to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in todayís digital age.
Tags : 
    
Gigamon

ESG Economic Validation: Analyzing the Economic Benefits of Gigamon

Published By: Gigamon     Published Date: Apr 11, 2019
Download ESGís Economic Validation Report, ďAnalyzing the Economic Benefits of Gigamon,Ē to see how Gigamon increases NetFlow performance by 100%, reduces hardware and tooling costs by 50%, decreases network downtime by 30% and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can help business and enable new ideas and growth. See why ESG believes the Gigamon Visibility Platform is a critical tool for network success in todayís digital age.
Tags : 
    
Gigamon

The Future of Security Operations

Published By: Group M_IBM Q119     Published Date: Mar 01, 2019
The velocity of technology infrastructure change continues to accelerate, putting serious stress on Security Operations (SecOps). This has forced security folks to face the fact that operations has never really been their forte. Thatís a bit harsh, but denial never helps address problems. The evidence is fairly strong that most organizations are pretty bad at security operations. How many high-profile breaches could have been avoided if one of many alerts was acted upon? How many attacks were made possible by not having properly patched servers or infrastructure? How many successful compromises resulted from human error?
Tags : 
    
Group M_IBM Q119

VIAVI Observer GigaFlow

Published By: Laser 2000     Published Date: Mar 12, 2019
End-user experience & network security unifying NetOps and SecOps teams
Tags : 
    
Laser 2000

Aberdeen Report: Security Operations in Public Cloud Services - Going with your Strengths

Published By: McAfee     Published Date: Mar 31, 2017
Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers and †enterprises
Tags : 
virtualization, public cloud, infrastructure as a service, iaas, cloud security, devops, devsecops†
    
McAfee

User and Entity Behavior Analytics for McAfee Enterprise Security Manager

Published By: McAfee     Published Date: Mar 31, 2017
UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Todayís most advanced security operations use the technologies together to maximize each toolís strengths.
Tags : 
ueba, uba, siem, analytics, secops, soc, threat hunting, correlation, incident response
    
McAfee

Kinetic IT Video Case Study

Published By: McAfee     Published Date: Apr 06, 2017
Kevin O'Sullivan, Security Service Director, Kinetic IT, explains how this Australian managed security services provider relies on McAfee Enterprise Security Manager to deliver visibility of risks and threats for its customers.
Tags : 
siem, secops, security operations, threat visibility, compliance, integration
    
McAfee

Sustainable Security Operations: Optimize Processes and Tools to Make the Most of Your Teamís Time

Published By: McAfee     Published Date: Mar 31, 2017
Fragmented and siloed security infrastructure is not sustainable against todayís threats. Adopt an optimized approach that encourages collaboration and visibility across the enterprise.
Tags : 
secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
    
McAfee

Building a Sustainable Security Operations Model

Published By: McAfee     Published Date: Mar 31, 2017
Infographic to accompany the "Sustainable Security Operations" white paper. It demonstrates how sustainable security operations overcomes major inhibitors.
Tags : 
secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
    
McAfee
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.