All resources sponsored by:

Symantec

1 - 25 of 45 Matches
Internet Security Threat Profile in Numbers
sponsored by Symantec
WHITE PAPER:Which industries receive the most email attacks, including malware, phishing and spam?
Posted: 05 Dec 2017 | Published: 05 Dec 2017
Get This Now


8 Things to Know About a Secure Web Gateway
sponsored by Symantec
RESOURCE:Given the evolving way web and cloud app are used and the constantly shifting threat landscape organizations must confront, proxy architecture is more important than ever in terms of security. This editorial brief provides 8 things to know about a secure web gateway and the benefits it can deliver to your security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017
Get This Now


Get Shadow Data Under Control
sponsored by Symantec
RESOURCE:A new era of information security is dawning. According to TechCrunch, by 2020 we'll have 6.1 billion smartphone users. With this connectivity, sharing data over the internet can be hazardous. Access this infographic to learn about the challenges and risks with data and how GDPR could be the answer to helping improve your security.
Posted: 04 Dec 2017 | Published: 04 Dec 2017
Get This Now


Extend DLP to the Cloud
sponsored by Symantec
RESOURCE:This solutions brief provides insight into a data loss prevention strategy combined with cloud access security broker in order to advance your cloud security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017
Get This Now


What Every CISO Needs to Know About Cyber Insurance
sponsored by Symantec
WHITE PAPER:The impact of a cyberattack to an organization's brand, reputation, and business operations can be catastrophic. Access this white paper to learn about why the implementation of cyber insurance can help improve your security posture and mitigate your risks of a cyberattack.
Posted: 04 Dec 2017 | Published: 04 Dec 2017
Get This Now


Top 10 Advantages of a Proxy Deployment in Conjunction with a NGFW
sponsored by Symantec
WHITE PAPER:While next-generation fire walls provide value to enterprises, they do not replace a secure web gateway technology. This solutions brief offers 10 advantages of a proxy deployment in conjunction with a next-generation firewall. Access this asset to learn about how the two complement each other and can improve your security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017
Get This Now


Email Threats: An ISTR Special Report
sponsored by Symantec
WHITE PAPER:According to the ISTR Email Threats Report, approximately 8,000 businesses each month are targeted by BEC scams. Explore this ISTR Special Report to uncover staggering email threat statistics, including insight into emails infected with malware, spambots, spam, and more.
Posted: 01 Dec 2017 | Published: 01 Dec 2017
Get This Now


4 Questions Every Information Security Leader Must Answer
sponsored by Symantec
EBOOK:As a leader of security within your organization, it's your job to combat attacks and mitigate the damage. This e-book offers 4 questions every information security leader must answer to determine the strength of your organization's security across every stage of an attack lifecycle.
Posted: 01 Dec 2017 | Published: 01 Dec 2017
Get This Now


How You can Secure the Use of Cloud Apps and Services
sponsored by Symantec
WHITE PAPER:Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.
Posted: 15 Sep 2017 | Published: 15 Sep 2017
Get This Now


Combining Data Loss Protection with Cloud Access Security Broker Technology
sponsored by Symantec
WHITE PAPER:Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.
Posted: 14 Sep 2017 | Published: 14 Sep 2017
Get This Now


One System that can Give You Protection, Performance, and Quick Response
sponsored by Symantec
RESOURCE:Click inside to discover a program that can give you protection in a single agent, reducing complexity while delivering high performance and an orchestrated response.
Posted: 01 Sep 2017 | Published: 01 Sep 2017
Get This Now

TOPICS: 

Are You a Proxy Pro? Put Yourself to the Test
sponsored by Symantec
WHITE PAPER:ProxySG consolidates a broad feature-set to authenticate users, filter web traffic, identify cloud application usage, and provide data loss prevention and more. Check out these key capabilities you should leverage on your Blue Coat Proxy.
Posted: 23 Aug 2017 | Published: 31 Dec 2016
Get This Now


Enterprise Security
sponsored by Symantec
RESOURCE:Many enterprises are putting a large amount of trust in the cloud and mobile networks. Take a look at this resource to reveal strategies you can use to secure these endpoints and your enterprise data.
Posted: 23 Aug 2017 | Published: 31 Dec 2016
Get This Now


A New Dawn For Data Privacy
sponsored by Symantec
RESOURCE:At GDPR's core is the idea of privacy as a fundamental right, along with radical changes in the way organizations are required to manage data. Check out this infographic to start preparing your organization for the 2018 deadline.
Posted: 23 Aug 2017 | Published: 23 Aug 2017
Get This Now


Data Loss Prevention – Now with CASB
sponsored by Symantec
WHITE PAPER:Data is often maliciously targeted through cloud applications. This resource will help you determine strategies for using DLP and CASB to protect your company in the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016
Get This Now


Endpoint Protection
sponsored by Symantec
WHITE PAPER:As the threat environment evolves quickly and becomes more complex, organizations are struggling to keep up. Check out this white paper to learn more about the essential capabilities for boosting endpoint security.
Posted: 22 Aug 2017 | Published: 22 Aug 2017
Get This Now


Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER:Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017
Get This Now


How the Williams Martini Racing Team Protects its Data
sponsored by Symantec
CASE STUDY:Check out this case studying exploring how Williams Martini Racing overcame the challenge of securing high-value data by implementing endpoint, web, and data center protection.
Posted: 18 Aug 2017 | Published: 31 Dec 2016
Get This Now


Enterprise Cloud Applications & Services Adoption, Use, and Threats
sponsored by Symantec
RESEARCH CONTENT:This special "Shadow Data Research Report" addresses the challenges faced when securing data in cloud apps and services specific to Shadow. Plus the report covers the potential repercussions of data leakage including compliance and mitigation costs that we guarantee you'll never want to face.
Posted: 08 Aug 2017 | Published: 08 Aug 2017
Get This Now


Internet Security Threat Report
sponsored by Symantec
WHITE PAPER:In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017
Get This Now


Power of Proxy in Security
sponsored by Symantec
WEBCAST:With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threats, combat the "too many devices" problem, ensure compliance, and more.
Posted: 19 Jun 2017 | Premiered: Jun 6, 2017
Get This Now


Report: Your Guide to Today's Healthcare Threat Landscape
sponsored by Symantec
WHITE PAPER:Uncover 6 threats to your healthcare organization and how they have evolved over the past year, what specific dangers they pose to your healthcare organization, and what you can do to mitigate their harm.
Posted: 16 Jun 2017 | Published: 16 Jun 2017
Get This Now


Symantec GDPR
sponsored by Symantec
VIDEO:With severe financial penalties for GDPR non-compliance, enterprises can't just plan to afford to pay the fine. Discover what your organization needs to help prepare for the GDPR in May 2018.
Posted: 16 Jun 2017 | Premiered: 06 Jun 2017
Get This Now


10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec
WHITE PAPER:Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017
Get This Now


9 Ways to Solve the GDPR Compliance Challenge
sponsored by Symantec
WHITE PAPER:This white paper explores 9 technologies that can help you meet GDPR compliance and avoid the hefty fines associated with it.
Posted: 15 Jun 2017 | Published: 15 Jun 2017
Get This Now


1 - 25 of 45 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement