Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Security Spending Reports
1 - 25 of 166 Matches Previous Page  |  Next Page
Unified Security Management vs. SIEM: a Technical Comparison
sponsored by AlienVault
WHITE PAPER: Discover a comprehensive overview of SIEM including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

AlienVault

Busting Myths About Encrypted Communications
sponsored by Blue Coat Systems
RESOURCE: Discover and debunk several pervasive myths about encrypted communications and gain a solid understanding of its growing importance. Read on to answer: do current security measures slow encrypted traffic by up to 80%? Can this encrypted traffic create blind spots in security? And more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Amp Up Your Endpoint Data Security
sponsored by Dell and Microsoft
WHITE PAPER: More and more organizations are finding that effective security starts with endpoints. Discover ways to dramatically reduce the risk of harmful data breaches with proactive data protection, and advanced threat prevention designed for the mobile era.
Posted: 30 Jun 2016 | Published: 30 Jun 2016

Dell and Microsoft

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

Modern Adaptive Security
sponsored by Illumio
WHITE PAPER: Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

The State of Incident Response
sponsored by ServiceNow
RESEARCH CONTENT: Take a close-up look at the current practices and challenges associated with incident response processes and technologies. Browse through tips from IT leaders to guide your security framework.
Posted: 13 Jun 2016 | Published: 29 Feb 2016

ServiceNow

The Global Cost of Cyber Crime
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Five Reasons to Adopt an MSSP
sponsored by MASERGY
WHITE PAPER: Security breaches cost an average of $3.4 million per incident. This cost, coupled with the number of breaches that occurring in the past few years, is reason enough to seriously invest in managed security service providers (MSSPs). Discover the top five reasons why an MSSP is right for your business.
Posted: 27 May 2016 | Published: 11 May 2016

MASERGY

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

LogicNow

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

Client Study: Security Intelligence
sponsored by IBM
WHITE PAPER: This report features quantitative statistics documenting the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Uncover findings from 196 US IT and IT security practitioners.
Posted: 25 Jan 2016 | Published: 31 Jul 2015

IBM

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

CEB IT Budget Benchmark 2015 to 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ComputerWeekly.com

Evaluating the Next Generation of Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper looks at a next-generation threat prevention tool, evaluating the effectiveness of this form of technology and the practicality of implementing it.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Check Point Software Technologies Ltd.

5 Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: Could manages security service providers (MSSPs) be the answer to this conundrum? This white paper discusses the benefits of adopting an MSSP, listing 5 key reasons how they can improve your cyber defenses.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

MASERGY

Security Questions CEOs Should be Asking
sponsored by MASERGY
WHITE PAPER: This infographic highlights three of the most basic questions that you should be asking yourself about your security.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

MASERGY

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

Strategy Considerations for Enhancing Your Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper suggests building a security operations center (SOC) for a more innovative and effective approach to enterprise security.
Posted: 06 Aug 2015 | Published: 31 Dec 2013

IBM

Cyber security: Balancing risks and controls for finance professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The finance community is becoming more aware of the impact of cyber security but there is scope for significant improvement, according to this report from Ernst & Young.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

ComputerWeekly.com

Survey Results: The Value of a SIEM Platform
sponsored by IBM
WHITE PAPER: To ensure you're getting the most out of your SIEM system, you need to understand the value it brings your organization and users. This report presents an in-depth review of one SIEM platform based on survey responses provided by independent IT professionals.
Posted: 05 Jun 2015 | Published: 28 Feb 2014

IBM

Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE: This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight
1 - 25 of 166 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement