Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 190 Matches Previous Page  |  Next Page
Strong Authentication for Secure Employee Access
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

A Faster, More Effective Way to Manage Authentication Deployments
sponsored by SafeNet, Inc.
WHITE PAPER: Next generation authentication services can make accessing virtualized and cloud-based services less of a struggle. Read on to see more of what a next generation authentication service can do for your organization.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

IAM and Authentication Trends in 2015
sponsored by SafeNet, Inc.
WEBCAST: This webcast takes into consideration the forces of the cloud, mobility, and user identity, and the way these forces are impacting IAM. The complex challenges created by these trends and what steps can be taken to overcome them are discussed.
Posted: 20 Aug 2015 | Premiered: Mar 24, 2015

SafeNet, Inc.

Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper coaches IT leaders on how to develop and retain the security analysts they need to keep their business safe.
Posted: 20 Aug 2015 | Published: 13 Nov 2014

Hewlett-Packard Company

Steer Your Enterprise Towards Smooth Mobility
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper weighs the benefits of securely adopting enterprise mobility and the potential roadblocks of doing so. Read on to learn more about secure enterprise mobility and its potential to impact every facet of your organization, from VPN to VDI.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

How One Ukrainian Bank Secures High-Risk Online Transactions
sponsored by SafeNet, Inc.
CASE STUDY: This case study reveals the solution that enabled Prominvestbank, one of the largest banks in Ukraine, to securely authenticate their online banking customers and accept transaction signatures online. Read on to learn about the benefits that these security services could bring to your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Lookout

Insider Threat Report 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

ComputerWeekly.com

Five Critical Questions You Should Be Asking SIEM Vendors
sponsored by Splunk
WHITE PAPER: This white paper examines one solution that provides agile threat response via a combination of pre-built data views and ad hoc analysis. Read on here to find out how to and cultivate the knowledge of your security practitioner by asking questions of potential vendors.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Splunk

Gain the Competitive Edge with Streamlined Big Data Analytics
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform across diverse industries, from healthcare and retail to telecommunications, highlighting common data processing use cases and exploring examples of specific use cases. Read on to find out more.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Dell, Inc. and Intel®

A SANS Survey: How Does Your Security Stack Up?
sponsored by LogRhythm, Inc.
WHITE PAPER: Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 30 Jul 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Safeguarding Data and the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

IBM

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: This white paper examines the modern DoS landscape, and provides several solutions in dealing with current DoS threats, given their fast-growing numbers.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix

Top 10 API Security Considerations
sponsored by Axway
WHITE PAPER: This white paper explores the top 10 considerations for security architects looking to tackle one of today's biggest security challenges: APIs.
Posted: 16 Jul 2015 | Published: 16 Mar 2015

Axway

Can You Tell If Your Cloud Servers Are Under Attack?
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to learn more about gaining visibility into your cloud or virtual infrastructure through an agile security and compliance platform.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Gartner Security & Risk Management Summit 2015: Schedules, Speakers, and More
sponsored by Gartner
WHITE PAPER: Access the following brochure to learn about the various topics, schedules, and strategies that will be covered during this year's Gartner Security and Risk Management Summit. Read on to learn will be speaking, future technology predictions, and more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

Gartner

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Your Move to the Cloud: A Managed Services Opportunity
sponsored by AVG Technologies
WHITE PAPER: This white paper presents the various cloud security business avenues available, as well as the pros and cons of each
Posted: 23 Jun 2015 | Published: 25 Mar 2015

AVG Technologies

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Website Defense in Depth – Examining the Protect, Detect, React Paradigm
sponsored by Distil Networks
WHITE PAPER: This white paper explores the Protect, Detect, React paradigm in depth and compares several platforms for specific security levels and requirements.
Posted: 27 May 2015 | Published: 25 Mar 2015

Distil Networks

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

Driving Agility and Security with Data Center Consolidation
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores several security strategies for defending virtualized and cloud-based data centers. Access now to learn how to defend both the physical and virtual planes as you imrpove agility through consolidation.
Posted: 05 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Running the Risk: Why a Generation of Sharing Could Be Good for Business
sponsored by Aruba Networks
WHITE PAPER: This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.
Posted: 01 May 2015 | Published: 01 May 2015

Aruba Networks
1 - 25 of 190 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement