Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 202 Matches Previous Page  |  Next Page
Information Security Consulting Services Report
sponsored by IBM
WHITE PAPER: This Forrester report evaluates 13 most significant information security consulting service providers against a 31 point criteria. It details how well these consultancies fulfill the criteria and where they stand in relation to each other.
Posted: 30 Aug 2016 | Published: 29 Jan 2016

IBM

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

KuppingerCole Leadership Compass: Access Management and Federation
sponsored by IBM
WHITE PAPER: Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.
Posted: 26 Aug 2016 | Published: 31 Mar 2016

IBM

How Security has Failed us, and what you Can Do
sponsored by Unisys
WHITE PAPER: Find out what Unisys Global Security Solutions GM, Tom Patterson, has to say about the state of security. Discover ways legacy systems have failed us, and what needs to be done to keep us safe.
Posted: 26 Aug 2016 | Published: 08 Jan 2016

Unisys

Enterprise Security: What Erodes Confidence
sponsored by Unisys
WHITE PAPER: True security experts know that it's time to lay simplistic perimeter defenses to rest -- before they continue to drain your resources. Explore this interview with Unisys' Chris Kloes as he offers insights from a recent security study.
Posted: 26 Aug 2016 | Published: 29 Apr 2016

Unisys

How Healthcare Benefits from Cloud-Delivered Security
sponsored by OpenDNS
WHITE PAPER: Cloud-delivered security is a cost-efficient and flexible method for dealing with healthcare security threats, while also improving your organization's ability to meet expanding compliance mandates. Discover how you can protect the full range of systems and requirements in your organization.
Posted: 26 Aug 2016 | Published: 01 Jul 2016

OpenDNS

ESG Lab Review: Performance and Scalability as Key Firewall Requirements
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

How Banks Secure Conversations with their Most Valued Customers
sponsored by NICE Systems, Inc
WHITE PAPER: Voice biometrics technologies are proving to be the ideal candidate for intelligent authentication in the context of client-to-advisor conversations. Discover ways to leverage a person's voice as an accurate identifier without interrupting the natural flow of conversation.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

NICE Systems, Inc

Benchmark Your Threat Detection Effectiveness
sponsored by RSA
WHITE PAPER: This white paper describes the results of a global survey of 160 respondents across 22 different industry sectors in the Americas, EMEA and APJ from December 2015 through February 2016 to understand how effective organizations are at detecting and investigating cyber threats.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA

Security Strategies for the Financial Sector
sponsored by Unisys
WHITE PAPER: Financial institutions must tighten security to stop threat actors, or they could create a chain reaction and cripple world trade. Access this resource to learn about tools with a history of stopping cybercrime in the banking industry.
Posted: 23 Aug 2016 | Published: 29 Jul 2016

Unisys

Security Solution Trends 2016
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.
Posted: 22 Aug 2016 | Published: 04 Dec 2016

Juniper Networks, Inc.

Minimizing the Identity Attack Vector with Continuous Authentication
sponsored by RSA Softcat
WHITE PAPER: Learn how continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.
Posted: 22 Aug 2016 | Published: 01 Apr 2016

RSA Softcat

Podcast: Exploring the Security Risks of Healthcare Orgs
sponsored by OpenDNS
PODCAST: Half of hospitals in the United States have been hit with ransomware. Learn how hospitals are often set up to fail and what your healthcare organization can do to overcome security shortcomings.
Posted: 19 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

What If an Invisible Attacker Tried to Bring Down Your Business?
sponsored by Lenovo
PODCAST: In this podcast, Carl Woerndle of Distribute.IT talks about a series of cyberattacks that assailed his business. Listen to find out what key lessons he took away from the experience that serve as a sobering wake-up call for any CIO or IT professional concerned about cybersecurity.
Posted: 10 Aug 2016 | Premiered: Aug 10, 2016

Lenovo

The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: When done right, securing the cloud can have a domino effect on improved access management, encryption, efficiency, and competitive advantage. Learn more about what 3,476 IT pros worldwide are saying about cloud governance and security practices.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

Gemalto

Infographic – IRM Underground Data Center
sponsored by Iron Mountain
WHITE PAPER: Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

Iron Mountain

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Top Ways to Enhance Security in 2016
sponsored by Intel
TRANSCRIPT: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Intel

Webcast - Enhancing Enterprise Security in 2016 – Part 3
sponsored by Intel
WEBCAST: This webcast informs you on the critical need for security intel sharing and how best to accomplish your sharing goals. Enable your organization to mitigate threats proactively while allowing other organizations to do the same.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel
1 - 25 of 202 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement