Overview: SecureWorks is a market leading provider of world-class information security services with over 2,700 clients worldwide spanning North America, Latin America, Europe, the Middle East and the Pacific Rim.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by SecureWorks.
Research offered by SecureWorks
10 Tips for Mobile Application Security by SecureWorks. June 18, 2012 - While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.
10 Tips to Help You Minimize the Duration and Impact of a Security Breach by SecureWorks. May 23, 2013 - Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Advanced Threat Protection with Dell SecureWorks Security Services by SecureWorks. August 16, 2012 - This whitepaper defines how Dell SecureWorks services can help organizations with intelligence, operations, visibility, incident response, testing and security awareness.
Advantages of Managed Security Services versus In-house Security Information Management (SIM) by SecureWorks. August 14, 2012 - Managing all the risks in today's threat landscape can be a challenge, but keeping sensitive data safe is essential for business success. Consult this white paper to find out more about how you can manage risks efficiently and effectively.
All the Ingredients for a Solid Security Incident Response Plan by SecureWorks. February 11, 2013 - Access this expert e-guide that presents the crucial steps in creating a solid security incident response plan, and the benefits one will bring to your organization.
Dell SecureWorks Positioned as a Leader in the Magic Quadrant for MSSPs, North America, 2012 by SecureWorks. November 15, 2012 - In this Magic Quadrant report, find a comparative analysis of leading managed security service (MSS) providers. Evaluate your MSS options by examining vendor strengths and weaknesses, allowing you to take a strategic approach to security management.
E-Guide: Bringing Value to Application Monitoring Through SIM by SecureWorks. December 05, 2012 - This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
E-Guide: Clearing Up the Confusion to Prepare for APTs by SecureWorks. December 05, 2012 - Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.
E-Guide: New Malware Threats Require New Antimalware Protection Strategy by SecureWorks. December 05, 2012 - This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Five Critical Rules for Firewall Management: Lessons from the Field by SecureWorks. June 08, 2011 - This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Going the MSSP Route: Understanding Total Cost of Ownership Issues by SecureWorks. November 23, 2010 - This white paper is designed to help IT professionals understand how best to analyze and evaluate the benefits of working with an MSSP organization in a critical context understood and appreciated by both IT and non-IT managers: Total Cost of Ownership (TCO).
ISM Essentials Guide – Threat Management by SecureWorks. December 18, 2012 - In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Justifying a Computer Incident Response Plan by SecureWorks. February 07, 2013 - This essential resource explores the need for effective incident response in order to reduce the costs of data breaches and mitigate risk. It also outlines best practices for creating an effective Computer Incident Response Plan (CIRP) – read on to learn more now.
Lifecycle of an Advanced Persistent Threat by SecureWorks. August 16, 2012 - Advanced Persistent Threats (APTs) are a serious concern for both governmental and private-sector organizations. Read this white paper to get the situational awareness and understanding you'll need to develop an effective and efficient Advanced Persistent Threat (APT) defense strategy.
Maintaining security in managed services by SecureWorks. December 05, 2011 - Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.
Presentation Transcript: Cloud Service Delivery Models - Security Risks and Recommendations by SecureWorks. August 23, 2011 - This presentation transcript examines how different levels of isolation and multi-tenancy in cloud models introduce different risks to organizations leveraging cloud services. We also discuss what organizations can do to address these risks and we recommend ways to deliver an improved security posture to organizations utilizing cloud services.
Staying Ahead of Cyberthreats: Recommendations for Financial Institutions by SecureWorks. March 02, 2012 - Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Stop strategies for preventing network intrusions by SecureWorks. December 05, 2011 - This expert E-Guide will provide you with the steps, processes, and prevention methods to maintain a secure network within your industry.
The Essentials Series: Security Information Management by SecureWorks. October 09, 2009 - This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
The Next Generation of Cybercrime by SecureWorks. May 31, 2011 - This white paper will educate you about a range of different security threats, as well as, the hackers that perpetrated these viruses. You will also receive a list of best practices for protecting your organization the right way.
The Three Most Important Elements of Incident Response Plan - Panel Video by SecureWorks. December 10, 2012 - This video asks today's security leaders what they feel are the three most important elements of their Incident Response plans, and whether they would respond differently if it is an advanced threat. Hear what top security professionals have to say by clicking through to watch now.
Threat Analysis: Understanding and Combating DDoS Attacks by SecureWorks. May 31, 2011 - This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Three Critical Decisions You Need to Make at the First Sign of a Security Breach by SecureWorks. May 23, 2013 - Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach.