REGISTER

Information Security

ISFtn pdf Download (1.23 MB)

Conventional approaches to deploying security controls seldom provide appropriate or sufficient protection for mission-critical information assets. The ISF Protection Process is astructured and systematic five-phase process for determining the approaches required to deliver comprehensive, balanced and end-to-end protection.

HPE default Download

Cloud computing is one of the largest, most dramatic forces changing the IT landscape today. Driven by key economic advantages, as well as factors that re-shape how fast enterprises can address global markets, and develop new services, there are substantial business benefits to the cloud. The savings can be substantial.

IDG logo logotypeNew survey finds most security deployments follow container-level, rather than more secure data-level, approaches to encryption. But enterprises understand at the highest levels that data security is critically important. Taking a proactive strategy will reduce corporate risk and also protect brand and reputation.

Rsam

How a University's Medical Center leveraged the Rsam SOAR platform to focus on risk-based remediation, create a central repository from multiple tools, decreased the number of outstanding action items and cut response time to incidents and vulnerabilities by 50%.

booz allen hamilton pdf Download (1.69 MB)

The Definitive Cybersecurity Guide for Directors and Officers. Companies increasingly use consumer data, including personal information, to stay competitive; this includes the capability to analyze their customers’ demographics and buying habits, predict future behaviors and business trends, and collect and sell data to third-parties.

HPEHadoop is a unique architecture designed to enable organizations to gain new analytic insights and operational efficiencies through the use of multiple standard, low-cost, high-speed, parallel processing nodes operating on very large sets of data. The resulting flexibility, performance, and scalability are unprecedented. But data security was not the primary design goal.

MetricStream

The MetricStream Security Threat and Vulnerability Management (STVM) App enables the effective management of IT assets by proactively aggregating and correlating threats and vulnerabilities from across information sources. The app integrates with multiple STVM tools, security intelligence feeds, and social media channels to automatically pull in STVM information. It then links the data to critical assets to identify risk exposures, and streamline and automate remediation processes.

HPE default Download

Discover how enforcing endpoint protection with key management solutions can help you continuously protect information generated by an increasingly mobile workforce.

RiskVision

Innovation Tech Insight for Security Operations, Analytics and Reporting

Security operations, analysis and reporting technologies support workflow management and automation, analytics and reporting. This enables security operations teams to automate and prioritize security operational activities and report data to inform better business decision making.

RiskVision

The Essential Building Blocks for Cyber Security

Best Practices in Building an Effective Cyber Defense Strategy.

ISFtn pdf Download (727 KB)

To assist ISF Members, the annual ISF Threat Horizon report takes a two-year perspective of major threats, describing potential implications and providing recommendations to organisations.

Rsam

Rsam SOAR solution includes Threat Management, Vulnerability Management, and Security Incident Response modules. Customers can leverage the integrated solution or any one of the modules to get started. This datasheet describes the full solution, security tool integration and benefits

MetricStream

Authored by Vibhav Agarwal, Senior Manager of Product Marketing, MetricStream and Dr. Michael Redmond, FBCI, MBCP, CEM, PMP, MBA, PHD, CEO and Lead Consultant Redmond Worldwide.

Go to top