Webinar

Splunk + EnCase:
3 Ways to Improve Operational Intelligence with Forensic Security

Presenters:
Mitchell Bezzina, Principal Solutions Consultant, Guidance Software
Megan Stewart, Professional Services Consultant, Guidance Software

Watch Webinar
Enfuse 2018 | May 21- 24
Learn More

Types

Topics

Products

Languages

Whitepaper

The Foundation of Continuous Host Monitoring

SANS Instructor and Analyst Matt Bromiley examines some of the difficulties organizations face when trying to improperly scale forensic tools and/or concepts. He hypothesizes there’s a direct correlation between improper response and ineffective dete...
pdf
Whitepaper

GDPR Compliance: Preparing Your Organization

Organizations that handle the personal data of EU citizens are already keenly aware of the EU’s new General Data Protection Regulation (GDPR) and their need to comply with it. But what does a successful compliance strategy look like? This white paper...
pdf
Whitepaper

5 Steps to Jumpstart your IG Initiative

Information Governance (IG) is a broad topic and an emerging market with decision structures and authority figures being defined across organizations and industries. In this whitepaper, we will cover the apparent barriers to IG adoption and five ste...
pdf
Whitepaper

Cross-Border Data Privacy in Focus

Cross-border data transfer issues will likely remain a top priority, particularly for the EU. Organizations should start the process of designing and implementing a privacy-compliant cross-border data transfer strategy now, as this can potentially be...
pdf
Whitepaper

Protecting Your Sensitive Data Beyond the Perimete...

Traditional Data Loss Prevention (DLP) solutions require significant resources, have functional shortcomings, and are highly complex. Misconceptions about its use all led to a decrease in popularity over the years, continuing to leave organizations ...
pdf
Whitepaper

Continuous Monitoring of Endpoints - Myths vs. Rea...

This whitepaper, written by Jon Friedman of the Cyber-Edge Group, examines various approaches to continuous monitoring in the EDR world and which methodology makes the most sense in today’s threat landscape.
pdf