Whitepapers

RSA NETWITNESS LOGS

RSA NETWITNESS LOGS

RSA NetWitness Logs is a security monitoring and forensics tool that collects, analyzes, reports on and stores log data from a variety of sources to support security policy compliance and regulatory compliance initiatives. The solution is modular and scalable and can be deployed across any type of enterprise. Unlike other log-centric SI EMs, RSA NetWitness Lags parses, enriches and indexes lags at capture time, creating sessionized metadata that serves to dramatically accelerate alerting and analysis. 

Læs mere
Go to whitepapers >>
THE PATH FROM GRC TO INTEGRATED RISK MANAGEMENT

THE PATH FROM GRC TO INTEGRATED RISK MANAGEMENT

Successful risk management today may start with governance, risk and compliance (GRC), but it shouldn’t end there. As more and more organizations embrace digital transformation, business risk grows in scope and complexity, and the need to manage it in a more agile, responsive manner becomes increasingly pressing. This paper maps out the path from a pre-digital, compliance-driven risk-management strategy to an adaptable, integrated approach that can keep pace with the fast-changing digital world.

Læs mere
Harden your attack surface

Harden your attack surface

F-Secure Radar is a turnkey, enterprisegrade vulnerability scanning and management platform. It combines IT asset discovery and inventory, identification and management both internal and external threats.Læs mere
Tomorrow's security delivered today

Tomorrow's security delivered today

Cyber security never stops. New attackers, tactics, and threats emerge every day. Hackers will never stop discovering and deploying new ways to breach your defenses.Læs mere
More control more security

More control more security

The amount and sophistication of cyber attacks is increasing.
And any organization can be a target. You simply need to have
data or assets to make your organization an interesting target.Læs mere

Din whitepaper-konto

Opret en gratis whitepaper-konto hos Version2 og få direkte og nem adgang til alle dokumenter, whitepapers, rapporter, cases og webcasts

It-nyheder

Reddit bandlyser brugere efter koordineret udbredelse af lækkede regeringsdokumenter

61 brugere er blevet bandlyst for på koordineret vis at have promoveret fortrolige dokumenter fra den britiske regering.

Kaspersky: Antallet af angreb på login med fingeraftryk og ansigtsscanning stiger

Hver tredje computer har været under cyberangreb med henblik på stjæle logindata fra ansigtsgenkendelse og irisscanning, viser tal fra...

Datatilsynet: Ingen grund til at ændre data-aftaler lavet efter vores skabelon

Databehandleraftaler lavet med udgangspunkt i Datatilsynets skabelon behøver ikke ændres, efter Det Europæiske Databeskyttelsesråd har...

IT-Universitetet i København udvider på grund af øget optag

Universitetet lejer lokaler hos naboerne i DR Byen.

Zork: Du står ved bunden af en endeløs trappe, foran dig finder du en længe fortabt kildekode

I denne uge er et stykke computerspilshistorie kommet op til overfladen. Kildekoden til det legendariske spil Zork, der ellers har været...

Whitepapers

RSA NETWITNESS LOGS

RSA NETWITNESS LOGS

RSA NetWitness Logs is a security monitoring and forensics tool that...

THE PATH FROM GRC TO INTEGRATED RISK MANAGEMENT

THE PATH FROM GRC TO INTEGRATED RISK MANAGEMENT

Successful risk management today may start with governance, risk and...

Harden your attack surface

Harden your attack surface

F-Secure Radar is a turnkey, enterprisegrade vulnerability scanning and...
Tomorrow's security delivered today

Tomorrow's security delivered today

Cyber security never stops. New attackers, tactics, and threats emerge every...
More control more security

More control more security

The amount and sophistication of cyber attacks is increasing.
And any...
Detecting targeted attacks with broad context detection

Detecting targeted attacks with broad context detection

Cyber security is in the midst of a paradigmshift. Targeted attacks are...
Best practices with BYOD

Best practices with BYOD

In today’s modern society the requirement for employees to be based within a...
Open Banking: Security considerations & potential risks

Open Banking: Security considerations & potential risks

The concept of Open Banking is an innovative one. However, as with any new...