Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
201 - 225 of 1791 Matches Previous Page  |  Next Page
Securing Your Amazon Web Services Environment
sponsored by Armor
WHITE PAPER: Learn how to make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization's situation and needs.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

2017 Report: Capabilities and Maturity of Cyber Defense Organizations
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive report learn the minutiae of the current threat landscape, discover how there has never been a stronger connection between security initiatives and business goals, and what trends are driving the evolution of security.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Hewlett Packard Enterprise

Ensure your Move to Azure is Secure
sponsored by Armor
WHITE PAPER: Learn how to ensure that your organization's data, applications, and operating systems are securely deployed, monitored and maintained in Azure's IaaS environment.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER: Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Gemalto

Symantec Data Loss Prevention Solution
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Sensitive information is leaving the safety of your corporate network and flying into the cloud where traditional security approaches hold little sway. Learn how to manage and protect your information in the modern, cloud-driven environment.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Symantec & Blue Coat Systems

Infographic: A New Dawn for Data Privacy
sponsored by Symantec & Blue Coat Systems
RESOURCE: EU General Data Protection Regulation (GDPR) will be implemented in 2018, introducing a new era in data security. In this infographic, learn what you need to know about GDPR and how it will affect your enterprise.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Symantec & Blue Coat Systems

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

How to Seamlessly Integrate Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.
Posted: 08 Mar 2017 | Published: 30 Sep 2016

Veracode, Inc.

Cost Savings, Risks, and Benefits: Armor Complete And Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester report, discover the security benefits, cost savings, associated risks and ROI of the Armor Complete and Armor Anywhere cloud data protection tools. Gain insight into what makes it and what doesn't in the face of today's threat landscape.
Posted: 08 Mar 2017 | Published: 31 Jan 2017

Armor

Fighting the Latest Evolution of Money Laundering
sponsored by BAE Systems
WHITE PAPER: This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.
Posted: 08 Mar 2017 | Published: 31 Dec 2016

BAE Systems

How Well Do You Know Your Customers?
sponsored by BAE Systems
WEBCAST: This webcast explores how KYC and anti-money laundering (AML) technology fit into your institution by viewing the organization in terms of a financial crime and risk management framework. Discover how to go beyond initial customer onboarding to implement ongoing risk management.
Posted: 07 Mar 2017 | Premiered: Mar 7, 2017

BAE Systems

Improving and Accelerating Fraud Detection and Prevention
sponsored by BAE Systems
RESOURCE: This resource explores how to combat modern financial crime and compliance challenges and improve your organization's ability to detect and prevent fraudulent claims, even in complex, high-volume environments. Discover a platform that enables you to detect more fraud faster, improve detection accuracy, accelerate decision-making, and more.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

6 Steps to Proactive Cybersecurity Protection
sponsored by BAE Systems
WHITE PAPER: Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

What Does Real-Time Threat Intelligence Enable?
sponsored by Recorded Future
WEBCAST: Discover how real-time threat intelligence empowers organizations to develop a proactive cyber security posture and helps to answer questions like, "When will I, or have I been, attacked?" and "How did the adversary breach the organization?"
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Why Threat Intelligence Matters to your Organization
sponsored by Recorded Future
WEBCAST: Gain an expert's viewpoint on what threat intelligence is, how it works and why it matters. Uncover how you can keep your information security teams stay ahead of cyberattacks.
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Recorded Future for Splunk Enterprise Security (ES)
sponsored by Recorded Future
WEBCAST: Explore how to use real-time threat intelligence to dramatically increase your organization's speed to avoid false positives and rapidly understand true incidents in context.
Posted: 06 Mar 2017 | Premiered: Nov 18, 2016

Recorded Future

Why The Changing Nature of Beneficial Ownership Compliance is Important to You
sponsored by BAE Systems
WHITE PAPER: Use this white paper to learn the importance of managing and reporting your company's beneficial owners, as well as some initial steps you can take towards achieving beneficial ownership compliance.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Advanced Detection of Existing, New and Evolving Cybersecurity Threats
sponsored by BAE Systems
WHITE PAPER: According to security experts, SIEM is currently catching less than 1% of successful advanced threats. Learn how to go beyond SIEM and discover how to incorporate a data platform with advanced threat analytics, big data capabilities, and an investigation console into your cybersecurity strategy.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

The Potential ROI of Fraud Detection and Prevention Tools
sponsored by BAE Systems
RESEARCH CONTENT: This Forrester Total Economic Impact report examines an analytical platform that provides organizations with the tools to detect, investigate, and prevent insurance fraud while minimizing the impact to genuine customers. Discover the potential ROI of this fraud detection and prevention platform, deployed either on-premise or in the cloud.
Posted: 03 Mar 2017 | Published: 31 May 2016

BAE Systems

Identifying TTPs with threat intelligence With Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Learn the finer points of knowing how to counter the tactics, techniques, and procedures (TTPs) of a malicious attacker. Uncover the value of identifying attacker TTPs and understanding information source types to ultimately improve relevant and timely intelligence reporting.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Exploring the Threat Intelligence Process
sponsored by Recorded Future
WHITE PAPER: This video demonstrates how you can use real-time threat intelligence to sort through data quickly so that you can focus on what matters: threat analysis and detection. Uncover the 3 core steps that go into the threat intelligence process.
Posted: 02 Mar 2017 | Published: 27 Oct 2016

Recorded Future

Threat Intelligence Reveals Secrets: From the Surface to the Dark Web
sponsored by Recorded Future
WHITE PAPER: Learn how the deep web, and by extension the dark web, are closer to the surface web that you most likely enjoy every day. Discover what we can learn from the connections between the three and what it means for your organization's security policy.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Turning Threat Data Into Threat Intelligence
sponsored by Recorded Future
VIDEO: Explore how you can consolidate massive amounts of real-time data from a wide range of sources in a concise view of available threat intelligence. See how you can view threat-related entities at once, such as hashes, domains, threat actors, and more.
Posted: 02 Mar 2017 | Premiered: 07 Feb 2017

Recorded Future

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and IntelĀ®
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and IntelĀ®
201 - 225 of 1791 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement