Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

eGuide | Presented by ThreatConnect

Security Orchestration and Automation

Security automation and orchestration platforms invoke “digital playbooks” to reduce risk, drive efficiency, and automate security operations at machine speed. This expert eGuide from IDG explains how security automation and orchestration platforms work and how you can justify the investment with a quantifiable business case. You’ll also learn how one organization is saving $1 million per year by automating phishing investigations.

The security operations platform: automation, orchestration and more

As the security automation and orchestration market matures, features like collaboration, event and case management, and reporting and metrics are growing in importance. Learn how burgeoning security operations platforms are finding a place in the modern securities operation center.

Automating and orchestrating security operations (and saving $1 million per year)

Learn how one organization automated phishing investigations to build a business case for security automation and orchestration.

The evolution of security operations, automation and orchestration.

The basic functionality of these products is being supplemented with strong integration, canned runbooks, and case management.