Vertical Industries  >   Financial Services Industry  >  

Financial Securities Industry

RSS Feed    Add to Google    Add to My Yahoo!
Financial Securities Industry Reports
 
Australian Privacy Act 1988 Amendment Explained
sponsored by Dell SecureWorks
WHITE PAPER: The amendments to the Privacy Act 1988 are going to force sweeping changes to the attitude around cybersecurity in Australia. This white paper explains who these amendments affect and what they mean for you.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Security Delivery Platforms for Dummies
sponsored by Gigamon
EBOOK: Access this for dummies e-book to discover how a security delivery platform can eliminate network blind spots, optimize security tool performance and scalability and resolve conflict between network and security ops.
Posted: 13 Jun 2017 | Published: 30 Dec 2016

Gigamon

Employee Social Network Password Practices a Major Workplace Risk
sponsored by Thycotic
WHITE PAPER: A survey conducted at the February 2017 RSA Conference in San Francisco reveals startling and disturbing insights into the password habits of security professionals (and likely their fellow employees). Discover key survey findings that can help protect your organization.
Posted: 17 Apr 2017 | Published: 30 Dec 2016

Thycotic

The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

Are You a Proxy Pro? Put Yourself to the Test
sponsored by Symantec
WHITE PAPER: ProxySG consolidates a broad feature-set to authenticate users, filter web traffic, identify cloud application usage, and provide data loss prevention and more. Check out these key capabilities you should leverage on your Blue Coat Proxy.
Posted: 23 Aug 2017 | Published: 31 Dec 2016

Symantec

6 Key Steps to Successful Identity Assurance
sponsored by RSA
WHITE PAPER: Uncover guidance on the six key elements to identity assurance and how to increase security while optimizing the end user's experience. Learn how to deliver access to users that's both convenient and secure.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

Ransomware: The Most Profitable Malware in History
sponsored by Cisco Umbrella
RESOURCE: Learn how to combat ransomware with four resources, including a blog post that details ransomware's past, present and future and a slideshow of ten shocking new facts about ransomware.
Posted: 30 May 2017 | Published: 30 Dec 2016

Cisco Umbrella

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement