SecureWorks

Results: 43



#Item
21Computing / SecureWorks / Managed security service / Symantec / Security event manager / Magic Quadrant / Security operations center / Security information and event management / MSS / Computer security / Computer network security / Cyberwarfare

Magic Quadrant for Managed Security Services, Worldwide

Add to Reading List

Source URL: www.secureworks.com

Language: English - Date: 2015-01-21 09:17:00
22Computer network security / SecureWorks / Customer experience management / Electronic commerce / Customer relationship management / Dell / Business / Marketing / Sales

66% Lead generation case study increase in conversation

Add to Reading List

Source URL: www.techtarget.com

Language: English - Date: 2013-06-25 15:10:35
23

White Paper - How to Act Against List Based Attack (JP)

Add to Reading List

Source URL: www.secureworks.jp

Language: Japanese - Date: 2013-09-10 14:45:12
    24Network architecture / DMZ / Stateful firewall / Network security / Access control list / Cisco ASA / Firewall / Transport Layer Security / File Transfer Protocol / Computer network security / Computing / Internet

    Multiple Vulnerabilities in Cisco ASA Jeff Jarmoc, SecureWorks Inc. Black Hat USA 2010 Abstract Firewalls, being among the oldest of security devices, have become somewhat less than

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English
    25Cyberwarfare / SecureWorks / Dell / Information security / Computer security / Threat / Network security / Managed security service / Check Point / Computer network security / Computing / Security

    Confidence to innovate Confidence to innovate How shared intelligence end-to-end builds simpler IT security that empowers rather than inhibits business

    Add to Reading List

    Source URL: i.dell.com

    Language: English - Date: 2015-01-23 15:42:18
    26Security / National security / Secure communication / Threat / Attack / SecureWorks / Malware / Department of Defense Cyber Crime Center / Department of Defense Strategy for Operating in Cyberspace / Computer network security / Cyberwarfare / Computer security

    Marcelle Lee Diversity in Tech: Increasing the Cyber Security Workforce Pipeline The demand for a qualified cybersecurity workforce has never been higher. With new reports of breaches virtually every day, it is clear tha

    Add to Reading List

    Source URL: www.acsc2015.com.au

    Language: English - Date: 2015-01-20 00:19:29
    27Computer security / Computing / Crime prevention / National security / SecureWorks / Hacking / Threat / Information security / Dell / Computer network security / Cyberwarfare / Security

    Small and Medium Business Solutions Information Security Services As larger organizations fortify their security defenses, small and medium size organizations are being targeted by threat actors such as cybercriminals,

    Add to Reading List

    Source URL: www.secureworks.com

    Language: English - Date: 2014-04-16 15:06:41
    28Management / Marketing / SecureWorks / Managed security service / Service / Computer network security / Business / Outsourcing

    Choosing an Effective Managed Security Services Partner Introduction Managed Security and Consulting services can deliver strong value to your security program. A Managed Security Services Provider can enhance your secur

    Add to Reading List

    Source URL: www.secureworks.com

    Language: English - Date: 2010-10-22 12:00:29
    29Concurrent computing / Business / Managed security service / Outsourcing / Data security / SecureWorks / Information security / Total cost of ownership / Dell / Computing / Computer network security / Costs

    Microsoft Word - Document18

    Add to Reading List

    Source URL: www.secureworks.com

    Language: English - Date: 2012-03-15 14:46:31
    30Cyberwarfare / SecureWorks / Dell / Managed security service / Security / Threat / Central Intelligence Agency / Institute for Information Infrastructure Protection / Information security / Computer network security / Computing / Computer security

    Enterprise Solutions Information Security Services Enriched by intelligence from our Counter Threat Unit™ (CTU™) research team, Dell

    Add to Reading List

    Source URL: secureworkspublic.http.internapcdn.net

    Language: English - Date: 2014-11-17 14:50:09
    UPDATE