Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 216 Matches Previous Page  |  Next Page
Is Your Data Secure?
sponsored by Commvault
INFORMATION CENTER: Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy.
Posted: 18 Oct 2016 | Published: 29 Jul 2016


Unify Security Intelligence to Create a Strong Threat Detection and Prevention Ecosystem
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper by Dr. G.W. Ray Davidson, discover how you can unify your security intelligence processes through automation and integration. Learn how you can develop a classification scheme to determine what data is most important to protect, expand this risk scoring to all areas of your enterprise, and more.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

LogRhythm, Inc.

MSSP Checklist
sponsored by AlienVault
WHITE PAPER: Discover how to become the best MSSP you can be through this checklist. It's advised that you modify it to fit your individual work style. The services you offer and your experience will influence the creation and the ongoing edits of this checklist.
Posted: 13 Oct 2016 | Published: 30 Sep 2016


IoT Security Testing: Cover All Your Bases
sponsored by Synopsys
EGUIDE: Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
Posted: 12 Oct 2016 | Published: 11 Oct 2016

Threat Analytics Module: Gain Visibility Into Malicious User Activity
sponsored by LogRhythm, Inc.
PRODUCT OVERVIEW: User accounts have long been one of the most prevalent attack vectors for advanced attacks and data breaches. This product overview highlights a threat analytics module that can secure your organization with immediate visibility into suspicious or malicious user activity indicative of an attack.
Posted: 12 Oct 2016 | Published: 31 Aug 2015

LogRhythm, Inc.

How to Fend Off Hackers with Frequent App Security Testing
sponsored by Synopsys
EGUIDE: In this expert guide, learn about the realities of the threat hackers pose to your business, as well as several ways that constant app security testing can help close up the gaps in which hackers could sneak in. Then, learn some of the challenges that implementing security testing could pose.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

Protecting the Distributed Enterprise: Network Security for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: The solution guide provides 5 key requirements that will collectively dictate the success of a distributed enterprise firewall deployment. It will elaborate on the details of each requirement and how it can be adopted to drive a cost-effective and reliable way to better protect your organization.
Posted: 07 Oct 2016 | Published: 01 Sep 2016

Fortinet, Inc.

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

2016 Mobile Applications Security Update
sponsored by Appthority
RESOURCE: Here's a comprehensive review of 2 major vulnerability types surfacing in Android apps: autorooting and overlay malware. Plus get analysis on whether Apple's faster app review times coincided with vulnerabilities that have plagued the App Store. And if that weren't enough, find out if the revised Android permissions model makes their apps safer.
Posted: 04 Oct 2016 | Published: 04 Oct 2016


Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016


Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

DDoS Attacks: Q2 2016 vs. Q2 2015
sponsored by Akamai
ANALYST REPORT: This security report shows you the cybersecurity and attack trends to the end of Q2 2016, specifically in regards to DDoS and web application attacks. Discover why there's been such a dramatic increase in DDoS and web application attacks.
Posted: 27 Sep 2016 | Published: 30 Apr 2016


Incident Response Capabilities in 2016: The 2016 SANS Incident Response Survey
sponsored by Intel Security
RESEARCH CONTENT: The 2016 SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.
Posted: 26 Sep 2016 | Published: 30 Jun 2016

Intel Security

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016


The General Data Protection Regulation Challenge
sponsored by Close Brothers Technology Services
WHITE PAPER: This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.
Posted: 21 Sep 2016 | Published: 30 Jun 2016

Close Brothers Technology Services

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016


Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Authentication Best Practices: On and Off the Cloud
sponsored by HID
EGUIDE: Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 12 Oct 2016 | Published: 12 Oct 2016


2016 Security Operations Center Report
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016


Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

New Tools Lead to Refined GRC Practices
sponsored by Proofpoint, Inc.
EGUIDE: See why most enterprises still struggle with governance, risk and compliance processes in the digital age. In this e-guide, learn the history of tried and failed document sorting methods and discover new tools, like text analytics and auto-classification that can help compliance practices in the future.
Posted: 22 Sep 2016 | Published: 20 Sep 2016

Proofpoint, Inc.

NSS Labs 2016 Breach Detection System (BDS) Group Test Results
sponsored by Fortinet, Inc.
RESEARCH CONTENT: Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection.
Posted: 21 Sep 2016 | Published: 01 Aug 2016

Fortinet, Inc.

From DevOps to DevSecOps: Integrating Security
sponsored by BMC
EGUIDE: They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
Posted: 14 Sep 2016 | Published: 07 Sep 2016


Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

1 - 25 of 216 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement