IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
1 - 25 of 1097 Matches Previous Page  |  Next Page
Insider Threats to Financial Services
sponsored by Recorded Future
WHITE PAPER: More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

The New Face of Cloud-Based Access management
sponsored by Gemalto
WHITE PAPER: Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Gemalto

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Automated, Real-time Risk Analysis and Remediation
sponsored by FireMon
WHITE PAPER: Managing risk within today's enterprise network environments is a significant challenge. This resource uncovers how to bridge the gap between enterprise risk and network teams.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

FireMon

What is a Non-malware Attack?
sponsored by Carbon Black
VIDEO: What is a non-malware attack? Uncover a clear definition, along with a quick example that helps to explain exactly what it can do and why it is so dangerous today.
Posted: 10 Aug 2017 | Premiered: 10 Aug 2017

Carbon Black

Cost of Cyber Crime Study
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: In this Ponemon Institute report, learn why companies with high security profiles experience an average cost of cybercrime that is much lower than those with low profiles.
Posted: 09 Aug 2017 | Published: 31 Oct 2016

Hewlett Packard Enterprise

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

Effectively Balancing DevSecOps
sponsored by Flux7
WHITE PAPER: As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

SME cyber security is increasingly a business imperative
sponsored by ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

ComputerWeekly.com

Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences
sponsored by NICE Systems, Inc
WHITE PAPER: Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

PASSIVE Voice Biometrics in ACTIVE Channels
sponsored by NICE Systems, Inc
RESEARCH CONTENT: Learn about the evolution of active vs. passive voice biometrics (VB) and how they combine with other speech processing technologies like automated speech recognition (ASR) to improve authentication and identity assertion in tandem with machine learning and AI.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

The Six Essential Capabilities of an Analytics Driven SIEM
sponsored by Splunk
WHITE PAPER: Legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Access this resource to uncover the 6 essential capabilities of an analytics-driven SIEM and learn how to keep your network secure.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

Compliance As Code - A Visual Guide
sponsored by Flux7
WHITE PAPER: Discover how to automate compliance processes and track the configuration of AWS, an important resource for development, production, and security teams. Plus, learn how to easily customize 6 common AWS Managed Config Rules.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Flux7

Secure Cellular Connectivity Empowers BlueNRGY's Global Reach
sponsored by Aeris
CASE STUDY: IoT and machine-to-machine (M2M) connectivity enables networks to overcome critical issues like interrupted services, security breaches, and high implementation and maintenance costs. Discover how BluNRGY enabled secure cellular connectivity for IoT in 190 countries and with more than 550 carriers.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Aeris

How to Mitigate IP Theft by Departing Employees
sponsored by Veriato, Inc.
WHITE PAPER: The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

The Challenges of Legacy SIEM Platforms
sponsored by Exabeam
WHITE PAPER: Explore 3 reasons why legacy SIEM tools no longer meet the needs of most organizations. Plus, uncover the benefits of a modern security intelligence [platform.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

80/20: The New and Not-So New World of OT and IoT Security
sponsored by Atos
WHITE PAPER: This white paper explores the new environments of operational technology (OT) and the Internet of Things (IoT), acknowledging the risks within, with proven security tools and practices. Learn how to use the new 80/20 rule to navigate and simplify OT and IoT into manageable segments.
Posted: 02 Aug 2017 | Published: 26 Jul 2017

Atos

IT Pro's Guide to Endpoint Protection
sponsored by Barkly
WHITE PAPER: Uncover key information on stopping malware and securing your business in this guide to endpoint protection. Discover why endpoint protection is more critical than ever, endpoint attackers' favorite targets, and more.
Posted: 01 Aug 2017 | Published: 31 Dec 2016

Barkly

Strengthen Your Ransomware Strategy
sponsored by AdvizeX Technologies
WEBCAST: Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
Posted: 31 Jul 2017 | Premiered: Jul 17, 2017

AdvizeX Technologies

Cyber security in the Nordics
sponsored by ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

ComputerWeekly.com

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.
1 - 25 of 1097 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement