Mandiant® - Detect. Respond. Contain.

Community Resources

Analyst Research

  • The Mandiant With a Plan – High-Profile Threat Report, New Products (451 Research)

    451-Research-Report---Mandiant-with-a-Plan.gif

    Mandiant took a gutsy step in publishing a threat report, profiling in great detail a particularly active and well-known group of attackers...and accusing them of being part of, or at least supported by, the Chinese government.

    Download The Mandiant With a Plan – High-Profile Threat Report, New Products (451 Research)

  • Determine The Business Value Of An Effective Security Program — Information Security Economics 101

    Forrester_Economics_101-web.gif

    Cybercriminals know the value of the information they steal and can quickly convert their loot to cash. CISOs need to combat this reality with financial models of their own to focus security efforts on information assets that produce the most current and future revenue.

    Download Determine The Business Value Of An Effective Security Program — Information Security Economics 101

  • Planning for Failure (Forrester Research)

    DOC_Planning_for_Failure_Forrester.gif

    The report addresses the reality that “[you] can't stop every cyberattack. However, your key stakeholders, clients, and other observers do expect you to take reasonable measures to prevent breaches in the first place, and when that fails, to respond quickly and appropriately.”

    Download Planning for Failure (Forrester Research)