4 results in Reports
Sort by:
Refine
  • Intel
  • Security Operations & Program Governance

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Data From Mutating Threats With A Zero Trust Network

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    IBM, Splunk, LogRhythm, And RSA Display Advanced Detection Features
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Incident Response Service Providers

    IR Services Are Vital To Mitigating The Consequences Of A Breach
    December 21, 2016 | Josh Zelonis

    A mature incident response (IR) is essential to your business. Breaches are inevitable, and the costs and damage to reputation can be massive. As a result, IR-as-a-service has fully graduated into...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize

    McAfee Is Better Off On Its Own Once Again
    September 9, 2016 | Jeff Pollard, Joseph Blankenship

    On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: S&R Pros Turn To Cyberthreat Intelligence Providers For Help

    CTI Providers Must Support Every Phase Of The Intelligence Cycle
    November 3, 2015 | Rick Holland

    The overwhelming threat landscape, coupled with the desire to transition from reactive to proactive security, is driving interest in cyberthreat intelligence. Organizations are looking to...