Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry White Papers (View All Report Types)
26 - 50 of 124 Matches Previous Page  |  Next Page
The General Data Protection Regulation Challenge
sponsored by Close Brothers Technology Services
WHITE PAPER: This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.
Posted: 21 Sep 2016 | Published: 30 Jun 2016

Close Brothers Technology Services

The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Best Practices for Social Media Archiving and Security
sponsored by Proofpoint, Inc.
WHITE PAPER: While social media can provide a number of important benefits to organizations, increasing use of social media comes with several security/compliance risks and costs. Uncover social media usage statistics, risk possibilities and how to best employ social media securely for your organization.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Incident Response Capabilities in 2016
sponsored by LogRhythm, Inc.
WHITE PAPER: As the attacker's landscape has changed, organizations have started to respond and are realizing they must respond quickly. Discover how the results of a 2016 incident response survey show a need for more efficient incident response teams, and learn what you can do to improve yours.
Posted: 01 Sep 2016 | Published: 30 Jun 2016

LogRhythm, Inc.

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Fortunately, it's possible for organizations with limited budgets and higher risk tolerances to achieve significant improvements in security maturity. Discover ways to adopt mature capabilities by building an integrated architecture.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

Anatomy of a Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

KuppingerCole Report: Access Management and Federation
sponsored by IBM
WHITE PAPER: Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.
Posted: 26 Aug 2016 | Published: 31 Mar 2016

IBM

ESG Lab Review: Performance and Scalability of Juniper SRX5400
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

2016 Security Trends and Predictions
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.
Posted: 22 Aug 2016 | Published: 04 Dec 2016

Juniper Networks, Inc.

Minimizing the Identity Attack Vector with Continuous Authentication
sponsored by RSA Softcat
WHITE PAPER: Learn how continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.
Posted: 22 Aug 2016 | Published: 01 Apr 2016

RSA Softcat

Infographic – IRM Underground Data Center
sponsored by Iron Mountain
WHITE PAPER: Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

Iron Mountain

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Cyberattacks are likely to increase in the coming years and by better understanding key indicators of vulnerability to breaches, executives and directors can begin to effectively mitigate the risk of a data breach. Discover the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

A Fortune 200 Global Manufacturing Services Company
sponsored by Digital Guardian
WHITE PAPER: This white paper tells the success story of Jabil, a company struggling with data visibility issues.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

Gartner: Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.
Posted: 01 Feb 2016 | Published: 19 Oct 2015

Digital Guardian

Gartner Competitive Landscape: Data Loss Prevention Market
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.
Posted: 29 Jan 2016 | Published: 22 Oct 2015

Digital Guardian

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

Factoring the Human Element into Your Data Breach Response
sponsored by AllClear ID
WHITE PAPER: Human nature can derail even the most well-documented and rehearsed breach response plans. Access this white paper to understand the factors that affect your team during a crisis, and the tactics you can incorporate into your plan to ensure a successful breach response operation.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

AllClear ID

Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

BMC

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

Information Security Consulting Services Report
sponsored by IBM
WHITE PAPER: This Forrester report evaluates the 13 most significant information security consulting service providers against a set of 31 criteria. Uncover how well these consultancies fulfill the criteria and where they stand in relation to each other.
Posted: 30 Aug 2016 | Published: 29 Jan 2016

IBM

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Delivering More Efficiency and Productivity With Modernized Data Protection
sponsored by HPE and Veeam
WHITE PAPER: This white paper teaches you about new, hyper-converged solutions, based on virtualization software that can transform your data center. Gain a more cost efficient solution with a smaller management footprint.
Posted: 27 Jan 2016 | Published: 30 Sep 2014

HPE and Veeam
26 - 50 of 124 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement