Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 329 Matches Previous Page  |  Next Page
Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Synopsys

Bitcoin Blackmailing Leads Mishi to Alibaba Cloud for WAF Protection
sponsored by Alibaba Cloud
CASE STUDY: In this case study, learn how Alibaba Cloud was able to protect the Australian food delivery app Mishi from future cyberattacks without disrupting their online platform.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Alibaba Cloud

How Does Mobile Device Management Differ from Traditional Security?
sponsored by Seqrite
WHITE PAPER: In this white paper explore the need for an mobile device management (MDM) system, as well as several best practices for selecting and deploying a comprehensive MDM solution to your enterprise in a way that will be beneficial to security, and intuitive for employees.
Posted: 28 Dec 2017 | Published: 28 Dec 2017

Seqrite

Protecting Your Enterprise from Ransomware Attacks
sponsored by Seqrite
WHITE PAPER: Click inside to take a more in-depth look at what makes a ransomware attack unique, and why you need to take steps to protect yourself. Then, learn about 5 protection mechanisms you can put into place.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

Comparing Security Information and Event Management Providers
sponsored by Splunk
RESEARCH CONTENT: With so many vendors on the market offering SIEM services that differ in subtle ways, how do you know which one is right for you? This Gartner Report seeks to answer that question by listing the pros and cons of 19 SIEM offerings so you can make your own informed choice.
Posted: 21 Dec 2017 | Published: 04 Dec 2017

Splunk

Next-Generation Firewalls: The Cornerstone of Future Security
sponsored by Palo Alto Networks
WHITE PAPER: Learn about one next-gen firewall that combines network, cloud and endpoint security capabilities, and enables them all with threat intelligence to help prevent cyber breaches. Read on to find 6 key abilities of this strategy.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Palo Alto Networks

Securing the Active Directory Foundation
sponsored by Quest
RESOURCE: In this infographic, learn what the government is doing to help better ensure a strong and secure Microsoft Active Directory environment.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Quest

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Security Analytics
sponsored by ComputerWeekly.com
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

ComputerWeekly.com

Better Security for Better Business
sponsored by Dell India
RESOURCE: In this infographic learn how to use your security system not only to protect your data but to empower the future of your company by balancing protection, with compliance and enablement.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

Dell India

Stop Malware Cold, Before it can Do Any Damage
sponsored by Dell India
RESOURCE: Click inside this infographic to discover why prevention – not reaction – is the best way to fight back against the growing malware threat.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Dell India

How are you protecting data from insider threats?
sponsored by Dell India
RESOURCE: In this infographic learn how insider data thefts happen, who's responsible for preventing them, and steps you can take to mitigate the frequency of these thefts.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Dell India

Your Report on the State of Ransomware for MSPs
sponsored by Datto, Inc.
RESEARCH CONTENT: Inside, hear what more than 1,700 service providers found to be major trends, targets, and impacts of ransomware attacks through early 2017, to help you better inform your backup and DR policies going forward.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Datto, Inc.

Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
sponsored by Juniper Networks, Inc.
EGUIDE: This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
Posted: 01 Dec 2017 | Published: 28 Nov 2017

Juniper Networks, Inc.

The Australian Privacy Amendment Explored
sponsored by Rapid7
DATA SHEET: Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Rapid7

GDPR Compliance: How to Comply with 3 Key Articles
sponsored by Rapid7
WHITE PAPER: While it will take a collection of services and tools to get into full compliance with the new General Data Protection Regulation (GDPR), security is a key piece. In this white paper, learn about a service which can help you prepare to meet 3 of the GDPR's articles so that you are ready to face this new law on every level of your IT environment.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Rapid7

Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER: In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7

Discover a Fully Managed Detection and Response System
sponsored by Rapid7
RESOURCE: Inside this resource, learn how to simplify the procurement of security tools and staff with a suite of managed detection and response services. Read on to find out how you can gain user behavior analytics, threat intelligence based on data from over 5,000 users, and more.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7

What You Need to Know About the General Data Protection Regulation (GDPR)
sponsored by Rapid7
WHITE PAPER: In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.
Posted: 22 Nov 2017 | Published: 22 Nov 2017

Rapid7

SIEM Analyst Research Bundle
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

Managed Security Service Provider Selection for Dummies
sponsored by Rackspace
EBOOK: In this book, you learn how to leverage a managed security services provider to enhance your organization's security posture in the cloud.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Rackspace

What does a CISO do now? It's a changing, increasingly vital role
sponsored by SearchSecurity.com
EBOOK: What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

SearchSecurity.com

AWS Security Checklist
sponsored by Amazon Web Services
WHITE PAPER: Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Amazon Web Services
1 - 25 of 329 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement