All resources sponsored by:

Rapid7

15 Matches
Log Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER:The log management space is confusing, noisy, and crowded with solutions that are often very similar or vague about their offerings. Discover 11 questions that you should be asking when shopping for a log management solution.
Posted: 16 Jun 2017 | Published: 16 Jun 2017
Get This Now


How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats
sponsored by Rapid7
CASE STUDY:In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.
Posted: 09 Jun 2017 | Published: 09 Jun 2017
Get This Now


15 Events To Log For Better DevOps
sponsored by Rapid7
WHITE PAPER:According to Puppet Labs' 2015 State of DevOps Report, DevOps-focused organizations report 60 times fewer failures, and 168 times faster recovery from failures than their non-DevOps focused peers. Access this white paper to find out how a DevOps implementation will affect your customer success, product team, marketing, and data science.
Posted: 09 Jun 2017 | Published: 09 Jun 2017
Get This Now

TOPICS:  CIOs

Building a More Effective Vulnerability Scanning Program
sponsored by Rapid7
WHITE PAPER:This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.
Posted: 09 Jun 2017 | Published: 09 Jun 2017
Get This Now


Building a World-Class Web Application Security Program
sponsored by Rapid7
CASE STUDY:Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.
Posted: 08 Jun 2017 | Published: 08 Jun 2017
Get This Now


IT/Security Alignment Paves the Way for Effective Risk Management at University of Salzburg
sponsored by Rapid7
CASE STUDY:Find out how the University of Salzburg's small IT team was able to gain simple reporting that helped them prioritize and remediate issues based off the needs of the organization in this case study.
Posted: 08 Jun 2017 | Published: 08 Jun 2017
Get This Now


Gain Deeper Insights into Your System with this Vulnerability Management System
sponsored by Rapid7
WHITE PAPER:In this white paper, learn about a new vulnerability management system which can provide you with constant intelligence to discover, pinpoint, and prioritize threats to your business.
Posted: 08 Jun 2017 | Published: 08 Jun 2017
Get This Now


Vulnerability Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER:In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system.
Posted: 07 Jun 2017 | Published: 07 Jun 2017
Get This Now


Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix
sponsored by Rapid7
WHITE PAPER:In this white paper, gain an overview of the top 10 business logic flaw attacks, as well as some tips on how you can test and eliminate these kinds of vulnerabilities.
Posted: 07 Jun 2017 | Published: 07 Jun 2017
Get This Now


Application Security Buyers Guide: 15 Requirements
sponsored by Rapid7
WHITE PAPER:In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017
Get This Now


7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER:In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017
Get This Now


7 Steps to Successfully Implementing Security Controls in Your Organization
sponsored by Rapid7
WHITE PAPER:In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning.
Posted: 05 Jun 2017 | Published: 05 Jun 2017
Get This Now


What are the Real Costs of the DIY ELK Stack?
sponsored by Rapid7
WHITE PAPER:Learn some of the less well understood requirements of a robust DIY ELK Stack, the benefits and consequences of using the elastic stack for DIY logging, the costs compared to managed services, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017
Get This Now


The CISO's Guide to Virtualization Security
sponsored by Rapid7
WHITE PAPER:Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.
Posted: 18 Jul 2012 | Published: 12 Jan 2012
Get This Now


Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER:Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012
Get This Now


15 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement