IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
76 - 100 of 1103 Matches Previous Page  |  Next Page
Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

You've Been Compromised - Now What?
sponsored by Dell SecureWorks
WHITE PAPER: Explore three critical questions you must answer and decisively act upon at the first signs of a security breach. Discover these questions to ensure your organization can protect itself from costly security incidents.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

The State of the Cybersecurity Arms Race
sponsored by SonicWall
RESOURCE: In the war against cybercrime, no one gets to avoid battle. In this resource, industry expert Bill Conner provides insight into staying up-to-date on the latest threats and cybersecurity innovations shaping today's landscape.
Posted: 08 Mar 2017 | Published: 06 Feb 2017

SonicWall

Cost Savings, Risks, and Benefits: Armor Complete And Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester report, discover the security benefits, cost savings, associated risks and ROI of the Armor Complete and Armor Anywhere cloud data protection tools. Gain insight into what makes it and what doesn't in the face of today's threat landscape.
Posted: 08 Mar 2017 | Published: 31 Jan 2017

Armor

Fighting the Latest Evolution of Money Laundering
sponsored by BAE Systems
WHITE PAPER: This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.
Posted: 08 Mar 2017 | Published: 31 Dec 2016

BAE Systems

How Well Do You Know Your Customers?
sponsored by BAE Systems
WEBCAST: This webcast explores how KYC and anti-money laundering (AML) technology fit into your institution by viewing the organization in terms of a financial crime and risk management framework. Discover how to go beyond initial customer onboarding to implement ongoing risk management.
Posted: 07 Mar 2017 | Premiered: Mar 7, 2017

BAE Systems

Six Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER: Let this white paper be your guide to implementing an effective, risk-based security approach. Learn how to identify the 6 key components needed to launch this type of approach, why it's effective at mitigating threats, and where you can customize the approach to provide maximum protection.
Posted: 07 Mar 2017 | Published: 07 Mar 2017

Dell SecureWorks

Improving and Accelerating Fraud Detection and Prevention
sponsored by BAE Systems
RESOURCE: This resource explores how to combat modern financial crime and compliance challenges and improve your organization's ability to detect and prevent fraudulent claims, even in complex, high-volume environments. Discover a platform that enables you to detect more fraud faster, improve detection accuracy, accelerate decision-making, and more.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

6 Steps to Proactive Cybersecurity Protection
sponsored by BAE Systems
WHITE PAPER: Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

What Does Real-Time Threat Intelligence Enable?
sponsored by Recorded Future
WEBCAST: Discover how real-time threat intelligence empowers organizations to develop a proactive cyber security posture and helps to answer questions like, "When will I, or have I been, attacked?" and "How did the adversary breach the organization?"
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Why Threat Intelligence Matters to your Organization
sponsored by Recorded Future
WEBCAST: Gain an expert's viewpoint on what threat intelligence is, how it works and why it matters. Uncover how you can keep your information security teams stay ahead of cyberattacks.
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Recorded Future for Splunk Enterprise Security (ES)
sponsored by Recorded Future
WEBCAST: Explore how to use real-time threat intelligence to dramatically increase your organization's speed to avoid false positives and rapidly understand true incidents in context.
Posted: 06 Mar 2017 | Premiered: Nov 18, 2016

Recorded Future

Board Oversight of Cybersecurity Risk: A Framework for Inquiry
sponsored by Dell SecureWorks
WHITE PAPER: Use this white paper as your tool for improving the board-management dialog on cybersecurity risk management. It will help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

Dell SecureWorks

Advanced Detection of Existing, New and Evolving Cybersecurity Threats
sponsored by BAE Systems
WHITE PAPER: According to security experts, SIEM is currently catching less than 1% of successful advanced threats. Learn how to go beyond SIEM and discover how to incorporate a data platform with advanced threat analytics, big data capabilities, and an investigation console into your cybersecurity strategy.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

The Value of Network Penetration Testing
sponsored by Dell SecureWorks
WHITE PAPER: Penetration tests are a critical part in identifying vulnerabilities in your network and IT environment that a scanner will not pick up. This concise white paper provides practical information to consider as you determine the proper testing needed to strengthen and improve your network's security posture.
Posted: 06 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Next-Gen Email Security and Advanced Threat Protection
sponsored by SonicWall
RESOURCE: SonicWall, a trusted security partner protecting more than a million business networks worldwide, announced a new email security platform and firewall for breach prevention against ransomware and other advanced threats. Discover how their platform integrates with advanced threat protection to deliver sound cloud-based cybersecurity.
Posted: 06 Mar 2017 | Published: 09 Feb 2017

SonicWall

The Power of Precise Threat Intelligence
sponsored by Dell SecureWorks
WHITE PAPER: Learn how the proper threat intelligence choices can maximize protection for your organization. Discover how to tailor your threat intelligence to your needs and how to pick out the right tools for the job.
Posted: 03 Mar 2017 | Published: 03 Mar 2017

Dell SecureWorks

The Potential ROI of Fraud Detection and Prevention Tools
sponsored by BAE Systems
RESEARCH CONTENT: This Forrester Total Economic Impact report examines an analytical platform that provides organizations with the tools to detect, investigate, and prevent insurance fraud while minimizing the impact to genuine customers. Discover the potential ROI of this fraud detection and prevention platform, deployed either on-premise or in the cloud.
Posted: 03 Mar 2017 | Published: 31 May 2016

BAE Systems

Identifying TTPs with threat intelligence With Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Learn the finer points of knowing how to counter the tactics, techniques, and procedures (TTPs) of a malicious attacker. Uncover the value of identifying attacker TTPs and understanding information source types to ultimately improve relevant and timely intelligence reporting.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Threat Intelligence Reveals Secrets: From the Surface to the Dark Web
sponsored by Recorded Future
WHITE PAPER: Learn how the deep web, and by extension the dark web, are closer to the surface web that you most likely enjoy every day. Discover what we can learn from the connections between the three and what it means for your organization's security policy.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Intelligent Security Operations: A How-To Guide
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find your roadmap for implementing an intelligent, analytics-driven security operations center in this white paper. Discover how to gain visibility into your organization to detect and respond to existing and new threats.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Hewlett-Packard Enterprise

Maintain Compliance with Around-the-Clock Monitoring and Threat Management
sponsored by Hewlett-Packard Enterprise
CASE STUDY: It's challenging to protect your organization quickly and accurately when you're overwhelmed by security alerts. Discover how a major North American hospital reduced its exposure to compliance problems by leveraging managed security services to enable around-the-clock monitoring of security logs.
Posted: 02 Mar 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

Do You Know Who I Am? Know Your Customer Systems Market Update
sponsored by BAE Systems
WHITE PAPER: Explore how Know Your Customer (KYC) systems provide organizations with the processes and workflows they need to assess the risk customers pose both at account opening and over time. Learn how to leverage KYC to boost customer onboarding and due diligence, improve risk management, integrate AML with KYC systems, and more.
Posted: 02 Mar 2017 | Published: 31 Aug 2016

BAE Systems

How Effective is Your AML Auditing?
sponsored by BAE Systems
WHITE PAPER: This white paper explores how to implement strong, comprehensive anti-money laundering (AML) audit processes to help you identify and prevent financial threats. Discover what defines an effective AML audit model, how to prep your AML audit, how to overcome AML audit challenges, and more.
Posted: 02 Mar 2017 | Published: 31 Dec 2016

BAE Systems
76 - 100 of 1103 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement