All resources sponsored by:

SearchSecurity.com

1 - 25 of 575 Matches
Making Sign-on Simple and Secure
sponsored by SearchSecurity.com
EBOOK:Single sign-on has a complicated history. This technical guide brings you up to date on how the main protocols for single sign-on -- OpenID and Security Assertion Markup Language (SAML) -- compare and how they can be connected to the pieces you already have. While SAML seems to be winning the field, OpenID shouldn't be ruled out.
Posted: 13 Mar 2015 | Published: 13 Mar 2015
Get This Now

TOPICS:  Security | SSO

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE:Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE:Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015
Get This Now


March Information Security – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE:Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015
Get This Now


Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW:This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com provides attendees with strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 27 Feb 2015 | Premieres: Apr 15, 2015, 08:15 EDT (12:15 GMT)
Get This Now


Web security meets DDoS Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:John Pescatore explores new DDoS attack vectors and discusses incident response planning (tools and processes) you need to plan for in 2015.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015
Get This Now


Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by SearchSecurity.com
EBOOK:As online shopping burgeons, so does credit card fraud. We examine the latest credit card scams, and how technology and standards set by the Payment Card Industry can help.
Posted: 13 Feb 2015 | Published: 13 Feb 2015
Get This Now


Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015
Get This Now


Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 03 Feb 2015 | Premiered: 02 Dec 2014
Get This Now


Security Magazine: Discover the Latest Security Tips
sponsored by SearchSecurity.com
EZINE:Denial-of-service attacks have caused serious disruptions for years. Yet 40% of enterprises remain unprepared to launch a DDoS defense and recover business services.
Posted: 02 Feb 2015 | Published: 30 Jan 2015
Get This Now


Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013
Get This Now


Rethinking the Paradigm of Advanced Threats
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Peter Sullivan explores why enterprises are failing to detect Regin-style advanced threats, and discusses how to realign people, processes and technology to reduce the risk by giving enterprises a fighting chance.
Posted: 20 Jan 2015 | Premiered: 23 Jan 2015
Get This Now


Resolve to Revitalize Your SIEM Security
sponsored by SearchSecurity.com
EBOOK:It's a new year, with new threats. Here's a thorough examination of four capabilities some new security information and event management (SIEM) products are offering.
Posted: 07 Jan 2015 | Published: 07 Jan 2015
Get This Now


Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014
Get This Now


Information Security Magazine: December 2014
sponsored by SearchSecurity.com
EZINE:The winners of Information Security magazine's Security 7 awards are announced. The Security 7 awards honor CISOs, security researchers and others at the top of their profession.
Posted: 01 Dec 2014 | Published: 01 Dec 2014
Get This Now


Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014
Get This Now


What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK:In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014
Get This Now


Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK:Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014
Get This Now


What to look for in secure file transfer
sponsored by SearchSecurity.com
EBOOK:This guide provides essential knowledge for enterprise InfoSec pros acquiring tools and products to transfer files efficiently and securely.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK:Learn how to integrate Wi-Fi security into your overall network strategy to help maintain security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014
Get This Now


Information Security Magazine – November 2014
sponsored by SearchSecurity.com
EZINE:The votes are tallied. More than 1,700 security practitioners participated in our Security Readers' Choice Awards 2014. Did your tools make the cut?
Posted: 07 Nov 2014 | Published: 07 Nov 2014
Get This Now


Information Security ASEAN November 2014
sponsored by SearchSecurity.com
EZINE:High profile Cyber security breaches in Singapore and Malaysia have focused minds and budgets on developing IT security skills.
Posted: 03 Nov 2014 | Published: 03 Nov 2014
Get This Now


Information Security ANZ November 2014
sponsored by SearchSecurity.com
EZINE:Australia's traditional teaching pathways are struggling to produce candidates with the right skills for today's rapidly-changing cyber-security climate.
Posted: 03 Nov 2014 | Published: 03 Nov 2014
Get This Now


Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition, InfoSec pros will learn about enterprise mobile management, or EMM, the new approach to security in the BYOD age, which focuses on security data rather than devices.
Posted: 15 Oct 2014 | Published: 15 Oct 2014
Get This Now


1 - 25 of 575 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement