Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
51 - 75 of 1704 Matches Previous Page  |  Next Page
Security Solution Trends 2016
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.
Posted: 22 Aug 2016 | Published: 04 Dec 2016

Juniper Networks, Inc.

Info-Tech Research Group 2015 SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover the effectiveness and simplicity SIEM can bring to threat managmenet for your organization. By integrating with other security technologies, the SIEM solution can act as a single window into the threats and possible breaches that your organization is facing. Learn how to get greater visibility into otherwise hidden threats.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

How to Approach Storage Disaster Recovery
sponsored by Rubrik
EGUIDE: In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
Posted: 22 Aug 2016 | Published: 18 Aug 2016

Rubrik

MINIMIZING THE IDENTITY ATTACK VECTOR WITH CONTINUOUS AUTHENTICATION
sponsored by RSA Softcat
WHITE PAPER: Continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.
Posted: 22 Aug 2016 | Published: 01 Apr 2016

RSA Softcat

Don't let your on-premises Active Directory be your Achilles' heel
sponsored by Dell, Inc.
WHITE PAPER: Learn how a hybrid Active Directory (AD) can keep your network safe from the vulnerability normally suffered by on-premises ADs. Discover how it establishes configuration baselines, detects and alerts administrators of realized and potential threats, and remediates unauthorized access and security changes.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Dell, Inc.

Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and other breaches
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive.
Posted: 19 Aug 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USMTM
sponsored by AlienVault
WHITE PAPER: University of Wisconsin–Superior's IT team was looking to replace their outdated intrusion prevention system. In this case study, discover how they were able to overcome budget challenges in order to find a solution that still met the security needs of their large network.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

AlienVault

Podcast: Exploring the Security Risks of Healthcare Orgs
sponsored by OpenDNS
PODCAST: Half of hospitals in the United States have been hit with ransomware. Learn how hospitals are often set up to fail and what your healthcare organization can do to overcome security shortcomings.
Posted: 19 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

Removing the Risk from Compliance in the Cloud
sponsored by VMware
WHITE PAPER: Within this white paper, learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

VMware

IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection
sponsored by RSA
WHITE PAPER: Discover how to bolster your existing security infrastructure with tools designed to detect advanced threats from each of the 3 STAP subcategories: endpoint, boundary, and internal network analysis. Learn how to combine capabilities designed to analyze suspicious files with behavioral analysis to identify suspicious file activity early.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

RSA

Cybersecurity Poverty Index
sponsored by RSA Softcat
WHITE PAPER: Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

Use These Five Backup and Recovery Best Practices to Protect Against Ransomware
sponsored by Druva Software
RESOURCE: Expert analysts reveal the top five backup and recovery best practices that enable you to defend against ransomware. Learn why your data is vulnerable to these attacks and how to repel them before you or your organization fall prey to attack.
Posted: 17 Aug 2016 | Published: 08 Jun 2016

Druva Software

Perspective: The art and science of value realization in the cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 17 Aug 2016 | Published: 25 Jul 2016

Infor

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks

Advanced Persistent Threats and the Case for a Security Intelligence and Response Program
sponsored by Above Security
WHITE PAPER: Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

DDoS Attack: Smoke Screen or Smoke Signal?
sponsored by Arbor Networks
WHITE PAPER: Learn how distributed denial-of-service (DDoS) attacks are used as not only a means of direct harassment of enterprise data, but also as a "smoke screen" in an attempt to conceal more surgical intrusion tactics. Discover why organizations must recognize DDoS attacks for the data security threats that they have become.
Posted: 17 Aug 2016 | Published: 08 Apr 2016

Arbor Networks

An Enterprise Security Program and Architecture to Support Business Drivers
sponsored by Above Security
WHITE PAPER: This white paper presents the case for leveraging enterprise security architectures to meet an organization's need for information assurance. It'll help you understand information assurance and show you how to align security initiatives with business goals to deliver an effective security program.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Don't Let The Cloud Cast A Shadow On Security
sponsored by Cisco Systems, Inc.
RESOURCE: Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

Cisco Systems, Inc.

Ransomware
sponsored by OpenDNS
PODCAST: This podcast looks at ransomware and how the cybercrime business operates.
Posted: 17 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

Ashley Madison
sponsored by OpenDNS
PODCAST: In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history. Uncover how it affected everyone on a personal level and the security details of how it occurred.
Posted: 17 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
sponsored by TrendMicro
EGUIDE: In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
Posted: 18 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Testing the Cloud: Ensuring Enterprise Data is Secure
sponsored by TrendMicro
EGUIDE: In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
Posted: 17 Aug 2016 | Published: 11 Aug 2016

TrendMicro
51 - 75 of 1704 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement