Vertical Industries  >  

Security Products Industry

RSS Feed    Add to Google    Add to My Yahoo!
Security Products Industry Reports
 
Bank Invests in Centralized Security Visibility to Promote Business Intelligence
sponsored by Splunk
CASE STUDY: Read this case study to determine how Orrstown Bank leveraged a cloud security platform to provide increased visibility into its complex hybrid IT infrastructure, resolve threats and maintain required compliance.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Splunk

Encrypting your Data Center on Oracle's SPARC Servers
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Explore the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Oracle Corporation UK Ltd

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Cyberattacks are likely to increase in the coming years and by better understanding key indicators of vulnerability to breaches, executives and directors can begin to effectively mitigate the risk of a data breach. Discover the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Gartner Competitive Landscape: Data Loss Prevention Market
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.
Posted: 29 Jan 2016 | Published: 22 Oct 2015

Digital Guardian

ESG Lab Review: Performance and Scalability of Juniper SRX5400
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

SANS Survey Report: Incident Response Capabilities in 2016
sponsored by Intel Security
RESEARCH CONTENT: The 2016 SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.
Posted: 26 Sep 2016 | Published: 30 Jun 2016

Intel Security

Endpoint Security Suites: How 15 Providers Stack Up
sponsored by Trend Micro
WHITE PAPER: In this 25-criteria evaluation of endpoint security suite providers, one firm has identified 15 significant game-changers. Uncover research, analysis, and scores for how each provider measures up so you can make the right choice.
Posted: 21 Nov 2016 | Published: 19 Oct 2016

Trend Micro

The IT Security Manager's Guide to Incident Response & Shadow IT
sponsored by Cisco
EGUIDE: This expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

Cisco

Authentication Best Practices: On and Off the Cloud
sponsored by HID
EGUIDE: Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

HID

How can proper BYOD and IoT device onboarding improve
sponsored by Ruckus Wireless
EGUIDE: This e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement