Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 184 Matches Previous Page  |  Next Page
Website Defense in Depth – Examining the Protect, Detect, React Paradigm
sponsored by Distil Networks
WHITE PAPER: This white paper explores the Protect, Detect, React paradigm in depth and compares several platforms for specific security levels and requirements.
Posted: 27 May 2015 | Published: 25 Mar 2015

Distil Networks

Securing the Digital Enterprise: API Security for the CSO
sponsored by Apigee
WHITE PAPER: The explosive growth of APIs means that threat protection, identity services, infrastructure security, and compliance have to be at the forefront of the CSO's mind. Access this resource now to learn why built-in API security alone isn't enough, for the sake of your organization's sensitive data.
Posted: 26 May 2015 | Published: 26 May 2015

Apigee

Make Cybersecurity A Priority With Teamwork And Preparation
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide explores various strategies to effectively communicate the importance of cybersecurity to management. Also inside, learn how to secure the organization's interior as well as the exterior to prepare for future attacks and manage risks.
Posted: 21 May 2015 | Published: 26 May 2014

Hewlett-Packard Company

6 Major Trends Shaping the Future of Security
sponsored by Box
WHITE PAPER: This white paper outlines the 6 major trends that are changing IT security as we know it.
Posted: 20 May 2015 | Published: 20 Feb 2014

Box

New Defence Strategy Needed To Combat Cybersecurity Adversaries
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper to learn why companies need to implement a new defense strategy to keep cybercriminals at bay.
Posted: 13 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

Driving Agility and Security with Data Center Consolidation
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores several security strategies for defending virtualized and cloud-based data centers. Access now to learn how to defend both the physical and virtual planes as you imrpove agility through consolidation.
Posted: 07 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER: This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015

Absolute Software

Driving Agility and Security with Data Center Consolidation
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores several security strategies for defending virtualized and cloud-based data centers. Access now to learn how to defend both the physical and virtual planes as you imrpove agility through consolidation.
Posted: 05 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Running the Risk: Why a Generation of Sharing Could Be Good for Business
sponsored by Aruba Networks
WHITE PAPER: This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.
Posted: 01 May 2015 | Published: 01 May 2015

Aruba Networks

Top Security Vulnerabilities
sponsored by Hewlett-Packard Company
RESOURCE: This infographic lays out the statistics of today's top vulnerabilities that hackers are exploiting. View now to learn what's on hackers' minds and how to strengthen your security strategy.
Posted: 29 Apr 2015 | Published: 01 Apr 2015

Hewlett-Packard Company

Today's Top Security Risks Revealed
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive white paper explores the current state of security threats that organizations are up against. Read on to learn how to prepare and strengthen defenses against evolving attacks.
Posted: 28 Apr 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

The Real Cost of Driverless Cars for Cybersecurity and Reliability
sponsored by Rogue Wave Software
WHITE PAPER: Several car manufacturers predict that self-driving cars will be on the road by 2020. What are the implications of the rapid increase in automotive software complexity for cybersecurity and reliability as development teams race to deliver this content?
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Rogue Wave Software

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Infographic: 2014 Honeypot findings across US, Europe and Asia
sponsored by Alert Logic
RESOURCE: Access this brief infographic to find out the types and frequencies of attacks and how they vary globally. View now to learn more.
Posted: 18 Mar 2015 | Published: 04 Dec 2014

Alert Logic

Cloudmark Security Platform for DNS
sponsored by Cloudmark
ASSESSMENT TOOL: If you suspect that your DNS has been compromised, use this DNS analysis page from Cloudmark to send them a traffic sample for complimentary analysis—the first step to take along the path to proven security success.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cloudmark

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

A Guide to Cyber Security that Fights the Worst Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.
1 - 25 of 184 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement