Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 350 Matches Previous Page  |  Next Page
Office 365: This the ROI You Were Expecting?
sponsored by Microsoft
WHITE PAPER: In this Forrester study learn the total economic impact of Microsoft Office 365 for small and midsize businesses, and give you a sense of what kind of ROI to expect when deploying Office 365.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

5 Questions Executives Should Be Asking Their Security Teams
sponsored by Microsoft
WHITE PAPER: This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Office 365: Is the ROI worth it?
sponsored by Microsoft
WHITE PAPER: In this Forrester report discover the ROI of Office 365, and better understand the benefits, costs, and risks associated with an Office 365 implementation within a mid-sized company.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Create Your Cloud Security Technology Strategy And Road Map
sponsored by Microsoft
WHITE PAPER: Forrester Research warns that "your current 'we control everything' security strategy does not apply to the cloud". With such a fundamental shift, how can CISOs approach the issue? Access this Forrester report to discover how to secure your enterprise on the cloud.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Learn How You can Provide UEM Across Desktops, Laptops, Tablets, Smartphones, and IoT
sponsored by IBM
DATA SHEET: Managing the security of all your organization's devices is a tall order, but it isn't impossible. In this data sheet, learn about a system that takes a smarter approach to unified endpoint management to help you consolidate your security.
Posted: 27 Apr 2017 | Published: 31 Mar 2017

IBM

Over 50% of Data is Mismanaged: Are You at Risk?
sponsored by Veritas
RESOURCE: Learn how to deploy information governance strategies to improve security, meet compliance, and reduce storage costs.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Veritas

Reduce End-to-End Encryption's Impact on Utilization and Response Time
sponsored by Oracle Corporation
RESOURCE: Discover how to reduce the effective impact of encryption on utilization and response time to be as close to zero as possible and allow the introduction of encryption integrated throughout the infrastructure stack, never allowing the data to be "clear" across the application, network and data ecosystem.
Posted: 26 Apr 2017 | Published: 15 Feb 2017

Oracle Corporation

The Six Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Uncover the 6 essential capabilities of an analytics-driven SIEM. Discover how having these capabilities will allow your enterprise to monitor threats in real time and respond quickly to incidents, minimize risks from insider threats or accidental compromise, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Splunk

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

ITAD to Strengthen Data Protection
sponsored by Iron Mountain
WHITE PAPER: IT Asset Disposition is quickly becoming a one stop shop for mitigating end-of-lifecycle risks and data protection compliance. Learn the importance of ITAD in protecting data and meeting compliance requirements.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Iron Mountain

Gov't Agencies: Remain Secure and Compliant with 5 Considerations
sponsored by TechData - Brother
WHITE PAPER: Discover 5 considerations when looking to remain secure and compliant in today's threat environment.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

TechData - Brother

DevSecOps: How to Seamlessly Integrate Security Into DevOps
sponsored by Sonatype
WHITE PAPER: In this Gartner report discover strong recommendations for IT security professionals to preserve the teamwork, agility and speed of DevOps and agile development environments, all while ensuring security.
Posted: 25 Apr 2017 | Published: 30 Sep 2016

Sonatype

Perimeter Security: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Discover how to rethink, re-invent, and re-architect your IAM strategies. Access this white paper to learn how to ensure secure authentication for all apps and address the inherent risks associated with decentralized access controls and identity sprawl.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

F5 Networks

Transitioning from Managed Services to Managed Security
sponsored by AlienVault
WHITE PAPER: Transitioning from MSP to MSSP is a well-trodden path and success is due to people, processes, and tech in equal proportions. In this white paper, learn about the current state of the MSSP market and best practices for new MSSPs.
Posted: 25 Apr 2017 | Published: 19 Dec 2016

AlienVault

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

ComputerWeekly.com

The Next Security Frontier: Automation, Things and Intelligent Machines
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: Stay on top of the current cybersecurity landscape and join us for this live virtual conference on June 27th.
Posted: 24 Apr 2017 | Premiered: 24 Apr 2017

SearchSecurity.com

Identity Management: The Key to Stopping Breaches
sponsored by SailPoint Technologies
WHITE PAPER: With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SailPoint Technologies

DDoS Recommended Practices
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn recommended network and application practices for successful DDoS attack protection.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

Achieving Optimal IFRS 9 Compliance
sponsored by SAS
WHITE PAPER: Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SAS

How to Secure Your Digital Experience
sponsored by Oracle Corporation
WEBCAST: Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape
Posted: 24 Apr 2017 | Premiered: Apr 19, 2017

Oracle Corporation

Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

IAM: Your Tool to Defeating Data Breaches
sponsored by SailPoint Technologies
WHITE PAPER: A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies
1 - 25 of 350 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement