Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
26 - 50 of 420 Matches Previous Page  |  Next Page
Taking Managed Services to the Next Level
sponsored by Datto, Inc.
EBOOK: As the threat landscape changes, security providers must also adapt. In this e-book, learn what it takes to protect against WannaCry and other new attacks, the answer to FAQs about lead generation, Ransomware growth broken down by the numbers, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Datto, Inc.

Insider Threats to Financial Services
sponsored by Recorded Future
WHITE PAPER: More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: In the era of the evolution of mobile devices and BYOD, client management tools must evolve in order to enhance security platforms. Read this white paper to find out how to provide security to your device's operating system using UEM.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Citrix

2017 Global Security Report
sponsored by Trustwave
RESEARCH CONTENT: The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global cyber security report, read about the current state of IT security and how it fares against evolving threats from hackers and cybercriminals.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Trustwave

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

The Future of Threat and Vulnerability Management
sponsored by BMC
RESEARCH CONTENT: In this Gartner research report, read 3 analyst predictions for the vulnerability management market. Discover key findings, market implications, and recommendations to improve your security posture.
Posted: 07 Aug 2017 | Published: 14 Nov 2016

BMC

SME cyber security is increasingly a business imperative
sponsored by ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

ComputerWeekly.com

How SecOps Addresses Critical Security Vulnerabilities
sponsored by BMC
WHITE PAPER: The rising number of devices connected to any given network, combined with common breakdown in communication between security and operations, creates a huge vulnerability problem. Use this white paper to find out how you can get your SecOps back on track.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

BMC

How to Mitigate IP Theft by Departing Employees
sponsored by Veriato, Inc.
WHITE PAPER: The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

How User Monitoring Helps Protect Against
sponsored by Veriato, Inc.
WHITE PAPER: In this white paper you'll learn why simply trusting your employees not to abuse their powers is not enough, and how this user and entity behavior analytics (UEBA) platform paired with user activity monitoring (UAM) can help create the secure environment you need.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

The Ransomware Survival Handbook
sponsored by Barkly
WHITE PAPER: This handbook will teach you everything you need to know about preventing, responding to, and recovering from a ransomware attack. From exploring what email documents it hides in, to a 4-step guide to bouncing back after ransomware infects your system, learn it all inside.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Barkly

Your 3 Step Cybersecurity Checklist
sponsored by Barkly
WHITE PAPER: IT security is a shifting landscape, and your policy needs to be ready to meet today's threats, as well as those that are still evolving. Find a 3-step checklist designed to help you craft a robust and adaptive security policy.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Barkly

4 Tech Disruptors that Could Radically Change Security Operations
sponsored by SearchSecurity.com
EZINE: Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
Posted: 01 Aug 2017 | Published: 01 Aug 2017

SearchSecurity.com

Cyber security in the Nordics
sponsored by ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

ComputerWeekly.com

The Future of I.T. Security starts with Virginia Tech
sponsored by Virginia Tech Online
WHITE PAPER: Data breaches are costly – in revenue and reputation – and organizations are actively looking for talented professionals who can help protect data stores. Learn what issues are keeping CIOs up at night, and the career opportunities available in this growing field.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Virginia Tech Online

Ransomware is on the Rise
sponsored by AdvizeX Technologies
RESOURCE: In this resource by 15-year industry veteran Sam Cattle, uncover a brief history of the rise of ransomware, and learn the 3 ways you can stop this threat.
Posted: 28 Jul 2017 | Published: 13 Dec 2016

AdvizeX Technologies

Creating an Organisational-Wide Culture of Security
sponsored by Dell SecureWorks
WHITE PAPER: When the winds of IT trends change, your security system needs to be able to change with them. Click inside to learn why an effective communication workflow is key to building an organization-wide culture around cybersecurity.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Dell SecureWorks

How you can Improve Security Posture Through the Creation of a Security Culture
sponsored by Dell SecureWorks
RESEARCH CONTENT: 84% of companies are doing the bare-minimum when it comes to IT security, and frankly that's not good enough anymore. Read about how you can foster a unique security culture in your organization inside.
Posted: 21 Jul 2017 | Published: 31 Mar 2017

Dell SecureWorks

Understanding the Security Leaders' Plight
sponsored by Dell SecureWorks
WHITE PAPER: When business leaders and security pros aren't communicating with each other, breaches can happen. Learn the 13 areas of IT security where cooperation between both teams is essential.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Dell SecureWorks

How to Detect & Respond to a Petya Ransomware Attack
sponsored by AlienVault
WHITE PAPER: On June 27th 2017, a new "Petya-like" form of ransomware spread from Ukraine to wreak havoc around the globe, crippling thousands of computers. Access this white paper to learn the 5 things we know for sure about this new threat and 5 steps to can take to respond to it.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

AlienVault

Rethink Security: A Massive Paradigm Shift in the Age of Access
sponsored by Centrify Corporation
EBOOK: Cyber criminals have increased resources at their disposal to get their hands on both end user and privileged user identities. In this e-book uncover the details about the massive shift occurring in the enterprise landscape and the security challenges this shift creates
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

10 Reasons Your Cyber Security Strategy Needs A Checkup
sponsored by Rackspace
RESOURCE: Click into this infographic to learn the 10 reasons your security might need a checkup.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Rackspace

Win the War Against Ransomware
sponsored by Commvault
EBOOK: If you're ready to protect your data from the increasing risk of ransomware, consider these 6 tips.
Posted: 23 Jun 2017 | Published: 31 Aug 2016

Commvault

Is Your IT Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
WHITE PAPER: Read this infographic to learn more about the trends, drivers, and challenges organizations face in regards to their workforce security.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell and Microsoft

What Makes a Cyber Resilient Organization?
sponsored by IBM Resilient
WHITE PAPER: With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.
Posted: 19 Jun 2017 | Published: 28 Feb 2017

IBM Resilient
26 - 50 of 420 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement