Security Management – Osterman Research https://ostermanresearch.com Insightful research that impacts organizations Sun, 09 Mar 2025 21:24:34 +0000 en-US hourly 1 https://i0.wp.com/ostermanresearch.com/wp-content/uploads/2021/01/cropped-or-site-icon.png?fit=32%2C32&ssl=1 Security Management – Osterman Research https://ostermanresearch.com 32 32 187703764 Upcoming webinar: Overwhelmed with Alerts – with Sevco Security https://ostermanresearch.com/2024/10/10/upcoming-webinar-overwhelmed-with-alerts-with-sevco-security/ https://ostermanresearch.com/2024/10/10/upcoming-webinar-overwhelmed-with-alerts-with-sevco-security/#respond Wed, 09 Oct 2024 18:00:32 +0000 https://ostermanresearch.com/2024/10/10/upcoming-webinar-overwhelmed-with-alerts-with-sevco-security/ Sevco Security sponsored our recent report on Making the SOC More Efficient. Sevco offers a single platform for exposure management, vulnerability prioritization, and remediation with visibility across the attack surface.

Next week on Thursday October 17, we will be talking with Brian Contos (Chief Strategy Officer at Sevco) about SOC efficiency research. You can attend the live webinar with us – Overwhelmed With Alerts? Best Practices for Improving SOC Efficiency and Effectiveness

The key topics for our conversation are:

  • Addressing the growth of backlogged alerts
  • Trends impacting the SOC over the next 24 months
  • Insufficient visibility into current and emerging threats across many systems
  • Strategies to drive more proactive approach to security threats

As background, we had a briefing with Sevco in August. There were several highlights for us from that conversation related to making the SOC more efficient:

  • Sevco’s emphasis on aggregating data signals from many different sources. Leveraging what exists via collection agents to pull everything together and provide the data for making decisions is a very clever play.
  • Sevco’s ability to empower the SOC to make decisions on escalations, policies, and procedures. Integration of everything for a comprehensive inventory means the SOC can minimize time spent doing data collection and triangulation, and instead use what Sevco makes available for such processes.

Hope you can join us next Thursday.

]]>
https://ostermanresearch.com/2024/10/10/upcoming-webinar-overwhelmed-with-alerts-with-sevco-security/feed/ 0 4623
Why Security Must Be Part of the Software Life Cycle – Webinar https://ostermanresearch.com/2019/08/01/webinar-security-sdlc-zeronorth/ Thu, 01 Aug 2019 04:00:00 +0000 https://ostermanresearch.com/?p=618 Sponsored by: ZeroNorth

As businesses embark on digital and cloud transformation to accelerate velocity and improve operational efficiencies, security just is not keeping pace. Virtually every business relies on software to keep it running, to keep it competitive. Simultaneously, application vulnerabilities are escalating, and breaches are common C-suite conversations. The current approach to application security relies on multiple security tools deployed at different layers of the software development life cycle, returning volumes of results. This taxes already understaffed application security and SecOps teams, who are challenged to make sense of it all, to address the vulnerabilities and to convey the full risk picture to the business. 

In the webinar, Michael Osterman, Principal Analyst, Osterman Research, will discuss:

  • Why the current approaches to security management are no longer adequate as the pace of business accelerates. 
  • The key steps to mitigate risk, including identifying, prioritizing and remediating vulnerabilities continuously.
  • Why security should be part of the software development process and at all points in the software lifecycle.
  • How prioritizing vulnerabilities properly can reduce risk

Register to watch the recording

]]>
618
White Papers – 2018 https://ostermanresearch.com/2018/12/10/whitepapers2018/ Sun, 09 Dec 2018 23:00:00 +0000 https://ostermanresearch.com/?p=845 Here’s our white papers from 2018. If you’d like a copy, please get in touch.

DateWhite PaperSponsor(s)
December
2018
Why You Should Seriously Consider Web Isolation TechnologyAuthentic8, Light Point Security and Proofpoint
December
2018
Why You Must Archive Business Content and What You Can Do With ItArchive360, Mimecast and Zix
December
2018
The Critical Need to Deal With Bot AttacksCequence Security
November
2018
Best Practices for GDPR and CCPA ComplianceAccessData, Dell EMC, Ipswitch, Micro Focus and Netwrix
November 2018Best Practices for File GovernanceMicro Focus
October
2018
Best Practices for Implementing Security Awareness TrainingInfoSec Institute, KnowBe4 and Mimecast
August
2018
Reducing Risks to Your Salesforce Data: Making the Case for a Third-Party Backup SolutionDruva
July
2018
A Buyers’ Guide to SecOpsCarbon Black
July
2018
Migrating Email and Archives to Microsoft PlatformsBitTitan, ExchangeSavvy, Gimmal, Micro Focus and Quest
May
2018
The GDPR Deadline Has Passed – What Should You DoDruva
April
2018
Best Practices for Protecting Against Phishing, Ransomware and BEC AttacksAgari, Barracuda, Cofense, DomainTools, KnowBe4, Malwarebytes, Proofpoint, Quest, SonicWall and Trend Micro
April
2018
Best Practices for the Next Generation of Content Archiving and Content ServicesDropsuite, HubStor, Smarsh and Viewpointe
March
2018
What You Need to Know About the GDPR (eBook)AccessData, Archive360, Dell EMC, GDPR Clinic, HubStor and RSA
March
2018
Supplementing the Limitations in Office 365AccessData, Druva, ENow Software, Forcepoint, Netmail, Proofpoint, Trend Micro, Viewpointe, ZEROSPAM and ZL Technologies
February
2018
The Procrastinator’s Guide to Preparing for the GDPRArchive360, Dell EMC, Ipswitch, MessageSolution, Mimecast, Proofpoint, Smarsh, StorageMadeEasy, Trustwave and ZL Technologies
January 2018Understanding the Critical Role of Disaster RecoveryArcserve
January
2018
Enterprise Vault Cost AnalysisArchive360 and Micro Focus
January
2018
Protecting Corporate Data When Employees Leave Your CompanyProofpoint and RSA
]]>
845