Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
201 - 225 of 1894 Matches Previous Page  |  Next Page
10 Tips to Stay Safe Against Ransomware and Advanced Threats
sponsored by Barracuda Networks
WHITE PAPER: Discover 10 tips for preventing ransomware, phishing and APT attacks. Train your users on safe computing practices and maintain that training over time to yield the best results for your organization.
Posted: 31 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Personify your Security Team and Gain Access a Recent Email Security Report
sponsored by Mimecast
WHITE PAPER: This infographic reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

User and Entity Behavior Analytics and Adaptive Response
sponsored by Preempt Security
WHITE PAPER: The majority of confirmed data breaches involved attackers posing as legitimate users or users maliciously wielding their access. Learn how to go beyond user and entity behavior analytics with proactive measures to preempt potential insider threats or breaches.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Preempt Security

Bot Defense Insights for Thwarting Automated Threats
sponsored by Distil Networks
WHITE PAPER: Learn not only what bots are but why they are a significant threat, why bad bots are created, and how to tackle the threat they represent to your enterprise. Access now to discover how to keep your organization safe from this very real menace.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Distil Networks

Vendor Comparison: Endpoint Security Leaders Revealed
sponsored by Carbon Black
RESOURCE: Discover which endpoint security provider Forrester determined was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.
Posted: 28 Oct 2016 | Published: 19 Oct 2016

Carbon Black

DraftKings Replaces Traditional Antivirus with Next-Gen AV (NGAV)
sponsored by Carbon Black
RESOURCE: Discover how DraftKings went about finding a comprehensive next-generation antivirus solution that wouldn't impact business operations. While DraftKings evaluated over 100 different providers, only one allowed them to continue working as normal, while protecting their network in the background.
Posted: 28 Oct 2016 | Published: 25 Oct 2016

Carbon Black

Case Study: WCA Hospital Eliminates Dual Prescribing Workflows and Increases Patient Satisfaction
sponsored by Imprivata
CASE STUDY: Learn how WCA Hospital implemented EPCS in order to improve their patient's experience with prescriptions, eliminate dual prescribing workflows, and improve provider satisfaction.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Imprivata

Benefits of Security Intelligence Services
sponsored by Kaspersky Lab
WHITE PAPER: This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they have a negative impact on your organization.
Posted: 27 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Closing the Circle of Network Security Defense
sponsored by Kaspersky Lab
WHITE PAPER: Explore how you can access comprehensive, trustworthy threat intelligence data so that you can defend against attacks before they're even launched. Uncover key features like accelerated incident response, threat hunting, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Kaspersky Lab

IT Security 101: Thinking Like a Cybercriminal?
sponsored by LogicNow
EBOOK: Understanding how the threat landscape is maturing means getting to grips with how cybercriminals think. This e-book illustrates 6 key considerations for bolstering cybersecurity. Download it now to establish an effective system to proactively address potential threats across the entire cyber landscape.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

LogicNow

Modernize Your Data Center Security
sponsored by VMware
WHITE PAPER: In a recent survey, 60% of respondents said they had adopted network virtualization to help address concerns with data security. Learn how building micro-segmentation on your virtualized network can help you verify and secure all resources, limit and strictly enforce access control, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

VMware

Can One Enterprise Firewall Tool Protect Your Entire Network?
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your entire attack surface, from IoT to cloud and from users to data, behind a single pane of glass. Learn why one network security operating system could be all you need to ensure end-to-end network protection against today's most advanced security threats and targeted attacks.
Posted: 27 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

Data Protection in Two Dimensions
sponsored by EOH IBM
WHITE PAPER: Discover a better approach to SSD data protection. Learn how to implement two independent dimensions of data protection, monitor your flash media's health, managed flash failures efficiently and optimize the utilization of all your flash resources.
Posted: 27 Oct 2016 | Published: 01 Jan 2016

EOH IBM

What a Fraudulent Invoice Email Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

What a Business Email Compromise Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Gain insight into how to avoid falling prey to these email scams and protect your enterprise's data. Discover not only the intricacies of these attacks, but how to ensure every member of your team is interacting with trusted email sources.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Uncheck Yourself: Build a Security-First Approach to Avoid "Checkbox" Compliance
sponsored by Armor
WHITE PAPER: This white paper helps you understand compliance as simply a reporting function of a sound security posture. By devoting adequate resources to countering today's threats, you'll find that your organization can meets all or nearly all compliance requirements, simply by following sound security practices.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Armor

The Hour-By-Hour Breakdown of Threat Actors Inside Your Environment
sponsored by Armor
RESOURCE: This infographic shows you an hour by hour breakdown of a threat actor through the typical "secure" environment so you can better understand how they carry out their dastardly deeds. By knowing them better and drafting your own plan of attack, you can best prepare yourself to fight back against cyber fiends.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Armor

Application Security Assessment
sponsored by Kaspersky Lab
WHITE PAPER: Access this overview of an app security assessment that uncovers and mitigates vulnerabilities throughout the app lifecycle. Discover how to detect security flaws for cloud, ERP, web, and mobile apps so that you can radically improve your ability to protect critical data and systems.
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

The Evolution of Locky Ransomware's Javascript Downloaders
sponsored by Booz Allen Hamilton
RESOURCE: Learn the history of the Locky ransomware virus and how to spot it. Discover how it was created and what you can do to keep it from infecting your systems.
Posted: 26 Oct 2016 | Published: 30 Sep 2016


Choosing The Right Two-Factor Authentication Solution for Healthcare
sponsored by Imprivata
WHITE PAPER: Learn why using two-factor authentication puts your healthcare organization miles ahead in terms of protecting your electronic records.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

Imprivata

Enterprise Security Gets Adaptive
sponsored by Kaspersky Lab
WHITE PAPER: This paper explores how to implement a more adaptive, integrated approach to security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help you defend against advanced persistent threats (APTs).
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

4 Ways to Protect and Recover from Ransomware Attacks
sponsored by Commvault
WHITE PAPER: Discover 4 best practices to protect and recover from ransomware attacks with confidence when you download this white paper.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Commvault

Increase Oracle Database Security Without Application Performance Loss
sponsored by Oracle Corporation UK Ltd
ANALYST REPORT: Learn how to implement strong security policies for Oracle Database. Uncover best practices to safeguard data while optimizing performance and increasing application availability.
Posted: 26 Oct 2016 | Published: 18 May 2016

Oracle Corporation UK Ltd

Encrypting your Data Center on Oracle's SPARC Servers
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Explore the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Oracle Corporation UK Ltd

SECURITY INVESTIGATION, DETECTION & RAPID RESPONSE WITH SPLUNK ENTERPRISE
sponsored by Splunk
WHITE PAPER: In this technical white paper, learn how to strengthen your overall security posture by simply interacting and exploring your data to find evidence of an infection or a breach. Learn how to use Splunk to search for keywords, terms or values to gain critical insights into your security posture.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Splunk
201 - 225 of 1894 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement