IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
Security Managers Reports
26 - 50 of 638 Matches Previous Page  |  Next Page
Survey Results: Wireless Security Trends
sponsored by Fortinet, Inc.
WHITE PAPER: Over half of 1,300 surveyed IT decision-makers revealed their preference for cloud-based wireless network management. Explore how to enable the segmentation of devices and access layers across wired/wireless networks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.

The Advanced Threat Protection Buyer’s Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: Use the following checklist to help determine the strength of your security strategy. Access now and explore ways to make informed choices to move towards an integrated system of prevention, detection, and mitigation against advanced threats.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Advanced Threat Protection Buyer’s Guide
sponsored by Fortinet, Inc.
WHITE PAPER: To improve your network security, you must do more than augment the latest technology to your security repertoire. Discover 3 strategies for combating threats of varying sophistication.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

DX.com Achieves Immediate Results in Fraud Control
sponsored by CyberSource
WHITE PAPER: Discover how the popular online retailer DealeXtreme was able to automate and streamline fraud management operations. What could you learn to help reduce your fraud rate and save thousands in fraud avoidance?
Posted: 22 Jun 2016 | Published: 22 Jun 2016

CyberSource

Architecture Matters: Beyond Layered Security Approaches
sponsored by Palo Alto Networks
WHITE PAPER: The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Palo Alto Networks

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

The Challenge Of Securing And Managing Today's Complex Network Environments
sponsored by Fortinet, Inc.
RESOURCE: This Forrester research report identifies the modern threats to enterprise IT and provides key recommendations for implementing firewalls and centralized management solutions, plus building protections into your network operations to thwart increasingly frequent and sophisticated attacks.
Posted: 13 Jun 2016 | Published: 29 Jan 2016

Fortinet, Inc.

Key Insights on Securing Networks Against Modern Cyber Threats
sponsored by Fortinet, Inc.
RESOURCE: Understand the capabilities, requirements and benefits of an evolved network security infrastructure. Inside, you'll see how an enterprise firewall can – and perhaps should – be the core of your security layout.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Fortinet, Inc.

IT Security Threats Facing Retail in 2016
sponsored by Verizon
RESEARCH CONTENT: This report reveals the 3 top IT security threats facing retail businesses in 2016. You'll see how you're vulnerable and what steps to take to begin improving your security strategy.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Verizon

2016 Report on Network Security in the Hospitality Industry
sponsored by Verizon
RESEARCH CONTENT: Learn about the network security vulnerabilities facing the hospitality industry in 2016. By identifying which issues are most prevalent in your industry, you'll have a head start in heading them off in your own enterprise.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Verizon

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.
Posted: 07 Jun 2016 | Premiered: Jun 7, 2016

Check Point Software Technologies Ltd.

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

User Behavior Analytics: Track Individual Data and Activities in Your Network
sponsored by Exabeam
EGUIDE: Insider threats are a top vulnerability for many organizations. In this e-guide, you'll learn about the threat posed by individual network users, and how to leverage user behavior analytics to track and expose them.
Posted: 01 Jun 2016 | Published: 24 May 2016

Exabeam

The Hunt for Data Analytics: Is Your SIEM on the Endangered List?
sponsored by Exabeam
EGUIDE: Some companies are pursuing data analytics as a complete security strategy, but many more are taking a hybrid approach. Learn how you can – and why you should – add more data analysis to your SIEM tools in order to reinforce your security defenses.
Posted: 31 May 2016 | Published: 20 May 2016

Exabeam

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

3 Reasons to Move to a Managed Security Service Provider
sponsored by MASERGY
MICROSITE: The cyberthreat landscape is growing with every technological advance. Learn how managed security service providers (MSSPs) can help bring the manpower to your constrained IT department by bringing new innovative services and approaches.
Posted: 27 May 2016 | Published: 17 Jun 2015

MASERGY

Five Reasons to Adopt an MSSP
sponsored by MASERGY
WHITE PAPER: Security breaches cost an average of $3.4 million per incident. This cost, coupled with the number of breaches that occurring in the past few years, is reason enough to seriously invest in managed security service providers (MSSPs). Discover the top five reasons why an MSSP is right for your business.
Posted: 27 May 2016 | Published: 11 May 2016

MASERGY

A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: This report examines the need for an enterprise network infrastructure with deeply embedded security to become more proactive in threat prevention.
Posted: 26 May 2016 | Published: 31 Mar 2016

Fortinet, Inc.

CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Move Your Email to the Cloud with Confidence
sponsored by Mimecast
WHITE PAPER: As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.
Posted: 24 May 2016 | Published: 24 May 2016

Mimecast

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: It's time to reevaluate access layer protection in enterprise WLANs and learn why deploying ad-hoc security is no longer enough to protect against threats. In this e-book, you'll read about new access layer defense strategies, and tips on how to select a secure WLAN solution.
Posted: 20 May 2016 | Published: 20 May 2016

Fortinet, Inc.

The State of Incident Response
sponsored by ServiceNow
RESEARCH CONTENT: Take a close-up look at the current practices and challenges associated with incident response processes and technologies. Browse through tips from IT leaders to guide your security framework.
Posted: 13 Jun 2016 | Published: 29 Feb 2016

ServiceNow
26 - 50 of 638 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement