Vertical Industries  >  

Security Products Industry

RSS Feed    Add to Google    Add to My Yahoo!
Security Products Industry Reports
 
The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Sonicwall 2017 Annual Threat Report
sponsored by Dell SonicWALL
WHITE PAPER: The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. In this 2017 annual threat report discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Dell SonicWALL

The Security Performance of 6 Key Industries
sponsored by BitSight
WHITE PAPER: Discover the security performance of six key industry sectors, how they prepare for cyberattacks, and the commonalities of their experiences in defending their data.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

7 Ways To Make Yourself Hard To Hack
sponsored by Solarwinds MSP
WHITE PAPER: Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Solarwinds MSP

Adjusting a Continuous Monitoring Strategy to a Hybrid Era
sponsored by LogRhythm, Inc.
EGUIDE: Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

6 Capabilities For Securing Office 365 Email
sponsored by Proofpoint, Inc.
WEBCAST: Discover the 6 key capabilities enterprises should consider to secure their Office 365 email environment. Plus, learn common pitfalls to avoid in the planning stages.
Posted: 07 Sep 2016 | Premiered: Aug 1, 2016

Proofpoint, Inc.

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
PODCAST: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 21 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Vendor Comparison: Endpoint Security Leaders Revealed
sponsored by Carbon Black
RESOURCE: Discover which endpoint security provider Forrester determined was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.
Posted: 28 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE: This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement