Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
51 - 75 of 295 Matches Previous Page  |  Next Page
THE SILVER LINING - Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
RESOURCE: In this quick infographic discover the hard numbers on how to protect corporate information in the cloud, and how the numbers of companies not embracing the cloud is shrinking.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Symantec & Blue Coat Systems

The Benefits of Public Cloud for Data Protection
sponsored by Quest
WHITE PAPER: Learn about another opportunity to use public cloud to make existing IT better. Uncover how to leverage the public cloud, or infrastructure-as-a-service (IaaS), for backup and recovery enabled data protection.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Quest

Hackers Have a Plan to Get to Your Privileged Accounts
sponsored by One Identity
WHITE PAPER: Gain a detailed walk through of the challenges of managing privileged accounts, and the importance of project planning and getting up-front buy-in from key stakeholders to ensure a successful implementation.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

Strategies to Ensure Success for your Privileged Management Project
sponsored by One Identity
WHITE PAPER: Learn how to properly secure, manage, and govern the accounts belonging to "superusers" – privileged accounts.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

Evaluating the Top Application Security Testing Vendors
sponsored by Veracode, Inc.
RESOURCE: This Gartner report focuses on top AST vendors' SAST, DAST and IAST offerings, maturity and features as tools or as a service. Learn all you need to know about top vendors' AST offerings to ensure you're picking the right tool for your business.
Posted: 10 Mar 2017 | Published: 28 Feb 2017

Veracode, Inc.

The Low hanging fruit of IAM – three fundamental things you should be doing
sponsored by One Identity
WHITE PAPER: Learn how to address where to begin with IAM and security solutions, how they are multi-layered, and 3 IAM best practices to ensure your enterprise has a strong security posture.
Posted: 10 Mar 2017 | Published: 31 Dec 2016

One Identity

Your Guide to Managed Security for Amazon Web Services
sponsored by Armor
WHITE PAPER: Uncover the tools you need to regain control and visibility, reduce costs, and ensure security down to the core of your AWS usage.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Armor

How Shadow IT Became Key to Multi-Cloud Strategies
sponsored by Armor
WHITE PAPER: Learn how your organization's workforce has created a web of shadow IT and how you can harness it to enjoy the benefits and control the risks to launch a successful multi-cloud strategy.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

Euronext Euronext’s recent IPO was a catalyst to create a coherent security environment across the new business.
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The point of security isn't just safeguarding data, mitigating loss, and providing ROI. Ultimately it's about providing peace of mind. Discover how Euronext was able to go beyond standard virus and scanning capability, reduce threat risk across their technology estate, improve threat visibility, mitigation and resolution action , and more.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Keeping Your Private Data Secure
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to protect your organization with various types of encryption, allowing your data to possibly stay safe even in the event of a breach.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Securing Your Amazon Web Services Environment
sponsored by Armor
WHITE PAPER: Learn how to make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization's situation and needs.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

Ensure your Move to Azure is Secure
sponsored by Armor
WHITE PAPER: Learn how to ensure that your organization's data, applications, and operating systems are securely deployed, monitored and maintained in Azure's IaaS environment.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER: Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Gemalto

Symantec Data Loss Prevention Solution
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Sensitive information is leaving the safety of your corporate network and flying into the cloud where traditional security approaches hold little sway. Learn how to manage and protect your information in the modern, cloud-driven environment.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Symantec & Blue Coat Systems

Infographic: A New Dawn for Data Privacy
sponsored by Symantec & Blue Coat Systems
RESOURCE: EU General Data Protection Regulation (GDPR) will be implemented in 2018, introducing a new era in data security. In this infographic, learn what you need to know about GDPR and how it will affect your enterprise.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Symantec & Blue Coat Systems

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

Cost Savings, Risks, and Benefits: Armor Complete And Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester report, discover the security benefits, cost savings, associated risks and ROI of the Armor Complete and Armor Anywhere cloud data protection tools. Gain insight into what makes it and what doesn't in the face of today's threat landscape.
Posted: 08 Mar 2017 | Published: 31 Jan 2017

Armor

Six Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER: Let this white paper be your guide to implementing an effective, risk-based security approach. Learn how to identify the 6 key components needed to launch this type of approach, why it's effective at mitigating threats, and where you can customize the approach to provide maximum protection.
Posted: 07 Mar 2017 | Published: 07 Mar 2017

Dell SecureWorks

What Does Real-Time Threat Intelligence Enable?
sponsored by Recorded Future
WEBCAST: Discover how real-time threat intelligence empowers organizations to develop a proactive cyber security posture and helps to answer questions like, "When will I, or have I been, attacked?" and "How did the adversary breach the organization?"
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Why Threat Intelligence Matters to your Organization
sponsored by Recorded Future
WEBCAST: Gain an expert's viewpoint on what threat intelligence is, how it works and why it matters. Uncover how you can keep your information security teams stay ahead of cyberattacks.
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Recorded Future for Splunk Enterprise Security (ES)
sponsored by Recorded Future
WEBCAST: Explore how to use real-time threat intelligence to dramatically increase your organization's speed to avoid false positives and rapidly understand true incidents in context.
Posted: 06 Mar 2017 | Premiered: Nov 18, 2016

Recorded Future

Board Oversight of Cybersecurity Risk: A Framework for Inquiry
sponsored by Dell SecureWorks
WHITE PAPER: Use this white paper as your tool for improving the board-management dialog on cybersecurity risk management. It will help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

Dell SecureWorks

The Power of Precise Threat Intelligence
sponsored by Dell SecureWorks
WHITE PAPER: Learn how the proper threat intelligence choices can maximize protection for your organization. Discover how to tailor your threat intelligence to your needs and how to pick out the right tools for the job.
Posted: 03 Mar 2017 | Published: 03 Mar 2017

Dell SecureWorks

Identifying TTPs with threat intelligence With Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Learn the finer points of knowing how to counter the tactics, techniques, and procedures (TTPs) of a malicious attacker. Uncover the value of identifying attacker TTPs and understanding information source types to ultimately improve relevant and timely intelligence reporting.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Threat Intelligence Reveals Secrets: From the Surface to the Dark Web
sponsored by Recorded Future
WHITE PAPER: Learn how the deep web, and by extension the dark web, are closer to the surface web that you most likely enjoy every day. Discover what we can learn from the connections between the three and what it means for your organization's security policy.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future
51 - 75 of 295 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement