Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry White Papers (View All Report Types)
1 - 25 of 103 Matches Previous Page  |  Next Page
Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 14 Jan 2017 | Published: 14 Jan 2017

Mimecast

7 Ways To Make Yourself Hard To Hack
sponsored by Solarwinds MSP
WHITE PAPER: Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Solarwinds MSP

Cybersecurity: Shift from a Position of Acknowledgement to Leadership
sponsored by SingTel
WHITE PAPER: Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

SingTel

Endpoint Security for the Empowered Enterprise
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This resource examines endpoint protection features that improve system performance and user productivity. Uncover Dell's Endpoint Security Suite Enterprise, how it supports encryption and advanced authentication, and the technical specifications required.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

2016 Security Pressures Report
sponsored by SingTel
WHITE PAPER: The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

Innovative Monetization Approaches for Home Security and Automation Organizations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Take an in-depth look at four innovative IoT approaches home security organizations are using to expand their services and grow their bottom line.
Posted: 27 Dec 2016 | Published: 30 Apr 2016

Cisco Systems, Inc.

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your mobile workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Two-Factor Authentication Helps Officers Protect and Serve New York
sponsored by BlackBerry
WHITE PAPER: Learn how field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents and keep their database safe.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Mobile Security Checklist: Top Ten Threats to Your Enterprise Today
sponsored by BlackBerry
WHITE PAPER: Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

BlackBerry

Secure and Accelerate User Access to Web Applications
sponsored by Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Secure Email Against Targeted Phishing Attacks
sponsored by Blue Coat Systems
WHITE PAPER: To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

Accelerating Your Incident Response & Improving Your Network Forensics
sponsored by Blue Coat Systems
WHITE PAPER: Network visibility is key to insightful security intelligence. Learn how to protect your workforce, fortify your network and improve overall security processes with complete visibility and streamlined forensics.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Managed Detection and Response
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Remove the burden or choosing the right security tools. Discover how to achieve best-in-class Managed Detection and Response with your limited budget.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

IoT Guardian for the Healthcare Industry
sponsored by Zingbox
WHITE PAPER: Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Zingbox

Persistence Technology and Securing Every Device
sponsored by Absolute
WHITE PAPER: Learn how your security leadership can reach out and secure lost or stolen enterprise hardware. With the capacity to remotely secure potentially vulnerable endpoints, you can finally embrace a mobile workforce without exhausting concerns about security.
Posted: 07 Nov 2016 | Published: 31 Dec 2015

Absolute

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Personify your Security Team and Gain Access a Recent Email Security Report
sponsored by Mimecast
WHITE PAPER: This infographic reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

2016 Security Operations Center Report
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

BMC
1 - 25 of 103 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement