Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
51 - 75 of 1851 Matches Previous Page  |  Next Page
Cost of Data Breach Study: United States
sponsored by IBM
RESEARCH CONTENT: The average cost for each lost or stolen record containing sensitive and confidential information increased from $217 to $221, according to the Ponemon Institute. Access this study for a look into the cost of data breach incidents in the United States.
Posted: 31 Aug 2017 | Published: 30 Jun 2016

IBM

So You've Been Breached: What to Do Next
sponsored by Armor
WHITE PAPER: When your system is breached by a malicious attack, it's no time to panic, it's time to act. Inside, discover the 5 steps you need to take to stop the exfiltration of data and return your system to normal operations with as minimal damage as possible.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Armor

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 30 Aug 2017 | Published: 28 Jul 2017

Splunk

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

How Should Companies Across the Globe Prepare for EU GDPR Compliance?
sponsored by Commvault
EGUIDE: As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance
Posted: 30 Aug 2017 | Published: 21 Aug 2017

Commvault

How to Find the Best DDoS Attack Prevention and Dection Tools
sponsored by SearchSecurity.com
EBOOK: Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

SearchSecurity.com

5 Reasons to Choose Dell EMC for Data Protection
sponsored by Dell EMC and Intel®
RESOURCE: Download this resource to get an overview of Dell EMC's data protection portfolio, including five foundational features that ensure you'll meet all of your data protection requirements.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

Increase Network Security Resilience
sponsored by Ixia
WHITE PAPER: Is your overall security architecture resilient enough to limit the risk of downtime to your network? Explore how you can build a more resilient IT security architecture to complement your firewall.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Ixia

What is a Non-malware Attack?
sponsored by Carbon Black
WEBCAST: Non-malware attacks leave a small footprint making them extremely hard to spot. Check out this 101 webcast to learn more about non-malware attacks and how you can protect yourself from them.
Posted: 24 Aug 2017 | Premiered: Aug 18, 2017

Carbon Black

Travis Perkins PLC Adopts Analytics-Driven SIEM to Enable Hybrid Cloud Transition
sponsored by Splunk Services UK Ltd
CASE STUDY: Uncover how a cloud-first approach and machine learning can enhance your security posture across hybrid environments. Read this case study to learn more about the benefits Travis Perkins PLC saw.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

Splunk Services UK Ltd

Build Your Identity and Access Management Strategy
sponsored by RSA
RESEARCH CONTENT: This Forrester Research report provides guidance for the development of a compelling and successful identity and access management strategic plan.
Posted: 23 Aug 2017 | Published: 03 Apr 2017

RSA

Mobile Application Authentication Trends and Best Practices
sponsored by RSA
RESEARCH CONTENT: Download this March 2017 Forrester Research report to learn about the various mobile application authentication methods, frameworks, tools and best practices for implementing mobile authentication at your organization.
Posted: 23 Aug 2017 | Published: 02 Mar 2017

RSA

Identity as a Service: Vendors Compared
sponsored by Centrify Corporation
EGUIDE: This analyst report compares different IDaaS platforms, so that you can implement the right technology for your organization's specific needs. Learn more about the current identity as a service vendors and tools.
Posted: 23 Aug 2017 | Published: 30 Jun 2017

Centrify Corporation

A New Dawn For Data Privacy
sponsored by Symantec
RESOURCE: At GDPR's core is the idea of privacy as a fundamental right, along with radical changes in the way organizations are required to manage data. Check out this infographic to start preparing your organization for the 2018 deadline.
Posted: 23 Aug 2017 | Published: 23 Aug 2017

Symantec

CW Nordics August 2017
sponsored by ComputerWeekly.com
EZINE: The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.
Posted: 23 Aug 2017 | Published: 24 Aug 2017

ComputerWeekly.com

Endpoint Protection
sponsored by Symantec
WHITE PAPER: As the threat environment evolves quickly and becomes more complex, organizations are struggling to keep up. Check out this white paper to learn more about the essential capabilities for boosting endpoint security.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Symantec

5 Cyberthreats Healthcare IT Pros Must Tackle
sponsored by Mimecast
WHITE PAPER: Defending your data against cyberthreats requires a multilayer defense. Check out this white paper to uncover the 5 critical cyberthreats of which IT healthcare professionals should be aware.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Mimecast

Protecting Data in the Healthcare Industry
sponsored by Mimecast
RESEARCH CONTENT: The large amount of personal information held by healthcare providers and hospitals make them ideal targets for cyberattack (especially from rogue employees). Read on to learn the history of compliance regulations, how current IT trends have increased risks (such as data theft), and what can be done to prevent data theft, fraud and more.
Posted: 21 Aug 2017 | Published: 31 Jul 2017

Mimecast

Report: The Quarterly Threat
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: Check out this report compiled by Proofpoint, Inc. to uncover sophisticated threats across email, the web, social media, and mobile.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Proofpoint, Inc.

SafeNet Authentication Service: Affordable, flexible, cloud-based authentication
sponsored by Gemalto
WHITE PAPER: When evaluating authentication tools, the choice is not just about security: deployment, management, and cost considerations are important factors as well. Read this white paper to discover how cloud-based authentication can provide protection while saving you money.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Gemalto

Computer Weekly – 22 August 2017: How banking technology has changed since the crash
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed. We look at how the EU's new data protection laws will affect storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or can bring benefits for enterprise IT. Read the issue now.
Posted: 18 Aug 2017 | Published: 22 Aug 2017

ComputerWeekly.com

The Security Compliance Countdown
sponsored by Citrix
RESOURCE: Why stress over the GDPR deadline? Check out this resource to discover a to-do list to ensure you are prepared.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Citrix

Recovering your Company's PCs Affected by Ransomware
sponsored by Acronis
WHITE PAPER: After a ransomware strike on a PC, your company data is at a serious risk. Read this white paper to learn how to safely protect your company's PCs after a ransomware strike.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Acronis

The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
EBOOK: SMBs need to spread awareness to employees regarding cyberattacks. Read this e-book to take a deeper look at tactics to help benefit your company when fighting off cybercrimes.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Datto, Inc.
51 - 75 of 1851 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement