Das Security Operations Maturity Model

Thumb original de security operations maturity model white paper

Dieses Whitepaper untersucht, wie die wichtigsten Aufgaben eines Security Operations Centers (SOC) bewertet und weiterentwickelt werden können: die Überwachung auf Bedrohungen, das Threat Hunting, die Untersuchung von Bedrohungen und die Reaktion auf Sicherheitsvorfälle.

Mit seinem Threat Lifecycle Management (TLM) Framework hilft LogRhythm Unternehmen, die Technologien, Mitarbeiter und Prozesse im SOC optimal aufeinander abzustimmen, um alle Aufgaben erfolgreich bewältigen zu können. Das TLM-Framework definiert die kritischen technischen Fähigkeiten und Workflow-Prozesse, die für ein effizientes und effektives SOC unabdingbar sind.

View whitepaper
Date: 18 March 2020, 0:00 am   |   Provider: LogRhythm EMEA   |   Size: 5.02 MB   |   Language: German
This may interest you too:
Thumb original uk uws using mitre attack in threat hunting and detection white paper

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. Having a taxonomy by itself has many valuable uses, such as providing a common vocabulary for exchanging information with others in the security community. But it also serves as a real technical framework for classifying your current detection efforts and identifying gaps where you are blind to certain types of attack beh ...

To the download
Thumb original uk the security operations maturity model quick reference guide brochure

The Security Operations Maturity Model Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need mature programs that leverage people, process and technology to rapidly detect and respond to sophisticated attacks.

Yet some organisations struggle with the overall effectiveness of their security operations. They also lack the basis for measuring the effectiveness and maturing capabilities. A mature security operation e ...

To the download
Thumb original rethinking your infrastructure for enterprise ai updated 25 jul 2020 85015685usen

Rethinking Your Infrastructure for Enterprise AI

IDC strongly believes that the days of homogeneous compute, in which a single architecture dominates all compute in the datacenter, are over. This truth has become increasingly evident as more and more businesses have started to launch artificial intelligence (AI) initiatives. Many of them are in an experimental stage with AI and a few have reached production readiness, but all of them are cycling unusually fast through infrastructure options to run their newly developed AI applications and services on.

The main reason for this constant ove ...

To the download
Thumb original 26017626usen 02 26017626usen

Shifting toward Enterprise-grade AI

Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process.

IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and ...

To the download
Thumb original 26026326eses 01 lr 26026326eses

Lista de comprobación de limpieza de datos

Le damos la bienvenida a la era de la inteligencia artificial (IA), donde los negocios se ven supeditados a tecnologías de uso intensivo de datos, como el aprendizaje automático y el aprendizaje profundo. Para aprovechar las ventajas de estas nuevas herramientas de IA, debe asegurarse de que el “hogar” en el que almacena los datos de su organización está ordenado.

A continuación dispone de una lista de comprobación para comenzar a limpiar los datos almacenados, que se desglosa en dos fases clave del proceso de limpieza: formación e inferenc ...

To the download