Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
26 - 50 of 199 Matches Previous Page  |  Next Page
It’s Time for a “Protect From Within” Mentality
sponsored by Forcepoint
WEBCAST: It's time to realign spending to match the most daunting and damaging threat - the insider. Take an in-depth look at how to establish an insider threat program and protect your organizations most important data.
Posted: 05 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

Bank Invests in Centralized Security Visibility to Promote Business Intelligence
sponsored by Splunk
CASE STUDY: Read this case study to determine how Orrstown Bank leveraged a cloud security platform to provide increased visibility into its complex hybrid IT infrastructure, resolve threats and maintain required compliance.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Splunk

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: With much of today's successfully executed breaches involving privileged users or credentials, mitigating risk has never been more pressing. Learn how meeting the requirements of Payment Card Industry Data Security Standard version 3 can lead to victory over privileged access violators.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Imperva

The Value of Threat Modelling
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway information security thesis series gives an overview of the value of threat modelling and describes some common modelling techniques.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ComputerWeekly.com

The Evolution of Network Security Hardware
sponsored by Aruba Networks
EGUIDE: This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Norton Cyber Security Insights Report – UK Insights
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

ComputerWeekly.com

Norton Cyber Security Insights Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime
Posted: 16 Feb 2016 | Published: 16 Feb 2016

ComputerWeekly.com

Broadening Your VDI Horizon Beyond Thin Client Devices
sponsored by Dell, Inc. and Intel®
EGUIDE: This exclusive e-guide details how you can move beyond traditional thin client devices for VDI access to either existing, reconfigured PCs or mobile devices. Access now and you'll learn how most non-thin-client access uses exactly the same mechanisms as thin clients.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Physical vs. Virtual Desktop Security: It's Just Not The Same
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Inc. and Intel®
EGUIDE: This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Cyberattacks are likely to increase in the coming years and by better understanding key indicators of vulnerability to breaches, executives and directors can begin to effectively mitigate the risk of a data breach. Discover the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

A Fortune 200 Global Manufacturing Services Company
sponsored by Digital Guardian
WHITE PAPER: This white paper tells the success story of Jabil, a company struggling with data visibility issues.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

It's time to tackle IoT security
sponsored by Ruckus Wireless
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless

How can proper BYOD and IoT device onboarding improve
sponsored by Ruckus Wireless
EGUIDE: This e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless

Breach Detection: What you need to know
sponsored by Carbon Black
WHITE PAPER: This e-book outlines the tactics today's advanced attackers use to steal your sensitive data and why you need a defense-in-depth cybersecurity program that incorporates automatic detection with incident response.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

Carbon Black

The IT Security Manager's Guide to Incident Response & Shadow IT
sponsored by OpenDNS
EGUIDE: This expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

OpenDNS

Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE: This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight

Compliance 101: Basics for Security Professionals
sponsored by Carbon Black
WHITE PAPER: This white paper helps security professional and non-professionals alike understand their roles when it comes to compliance.
Posted: 26 Feb 2016 | Published: 31 Jan 2016

Carbon Black

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Endpoint Threat Detection Gets More Response
sponsored by LogicNow
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

LogicNow
26 - 50 of 199 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement