All resources sponsored by:

Symantec

1 - 25 of 40 Matches
Protecting Your Sensitive Data
sponsored by Symantec
VIDEO:Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud.
Posted: 20 Feb 2018 | Premiered: 14 Feb 2018
Get This Now


6 Ways a CASB Makes Cloud Apps Safe for Business
sponsored by Symantec
WHITE PAPER:By 2022, 65% of business productivity tools are expected to have moved to the cloud, according to the Symantec Internet Security Threat Report. This resource offers 6 ways a cloud access security broker (CASB) enables cloud control across all apps and data.
Posted: 20 Feb 2018 | Published: 20 Feb 2018
Get This Now


Cloud Apps and Data Security: Are You Safe from the New Threats?
sponsored by Symantec
RESOURCE:How do you plan to conquer cloud chaos within your organization? This resource reveals how a cloud access security broker (CASB) can augment your cloud security approach, while embracing productivity-boosting cloud apps and services.
Posted: 19 Feb 2018 | Published: 19 Feb 2018
Get This Now


8 Essential Secure Web Gateway Characteristics
sponsored by Symantec
WHITE PAPER:According to Symantec's Shadow Data Report, most CIOs think their organizations use around 30 to 40 cloud apps; in reality, the average number is 1,232. This resource offers 8 essential characteristics of secure web gateways to ensure effective cloud security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018
Get This Now


Give your Web and Cloud Experiences a Security Tune-Up
sponsored by Symantec
WHITE PAPER:Securing a growing number of devices, operating systems, users and connections is a big challenge. Explore this resource to uncover 7 ways to optimize and get the most out of your secure web gateway.
Posted: 16 Feb 2018 | Published: 16 Feb 2018
Get This Now


Easily Extend Data Loss Prevention to the Cloud
sponsored by Symantec
RESOURCE:To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.
Posted: 15 Feb 2018 | Published: 15 Feb 2018
Get This Now


Extend DLP to the Cloud
sponsored by Symantec
RESOURCE:This solutions brief provides insight into a data loss prevention strategy combined with cloud access security broker in order to advance your cloud security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017
Get This Now


Top 10 Advantages of a Proxy Deployment in Conjunction with a NGFW
sponsored by Symantec
WHITE PAPER:While next-generation firewalls provide value to enterprises, they do not replace a secure web gateway technology. This white paper offers 10 advantages of a proxy deployment in conjunction with a next-generation firewall. Learn about how the two complement each other and can improve your security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017
Get This Now


Are You a Proxy Pro? Put Yourself to the Test
sponsored by Symantec
WHITE PAPER:ProxySG consolidates a broad feature-set to authenticate users, filter web traffic, identify cloud application usage, and provide data loss prevention and more. Check out these key capabilities you should leverage on your Blue Coat Proxy.
Posted: 23 Aug 2017 | Published: 31 Dec 2016
Get This Now


Enterprise Security
sponsored by Symantec
RESOURCE:Many enterprises are putting a large amount of trust in the cloud and mobile networks. Take a look at this resource to reveal strategies you can use to secure these endpoints and your enterprise data.
Posted: 23 Aug 2017 | Published: 31 Dec 2016
Get This Now


Power of Proxy in Security
sponsored by Symantec
WEBCAST:With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threats, combat the "too many devices" problem, ensure compliance, and more.
Posted: 19 Jun 2017 | Premiered: Jun 6, 2017
Get This Now


Symantec GDPR
sponsored by Symantec
VIDEO:With severe financial penalties for GDPR non-compliance, enterprises can't just plan to afford to pay the fine. Discover what your organization needs to help prepare for the GDPR in May 2018.
Posted: 16 Jun 2017 | Premiered: 06 Jun 2017
Get This Now


10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec
WHITE PAPER:Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017
Get This Now


9 Ways to Solve the GDPR Compliance Challenge
sponsored by Symantec
WHITE PAPER:This white paper explores 9 technologies that can help you meet GDPR compliance and avoid the hefty fines associated with it.
Posted: 15 Jun 2017 | Published: 15 Jun 2017
Get This Now


Analyzing the Malware Threat
sponsored by Symantec
WHITE PAPER:Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017
Get This Now


How You can Secure the Use of Cloud Apps and Services
sponsored by Symantec
WHITE PAPER:Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.
Posted: 15 Sep 2017 | Published: 15 Sep 2017
Get This Now


Combining Data Loss Protection with Cloud Access Security Broker Technology
sponsored by Symantec
WHITE PAPER:Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.
Posted: 14 Sep 2017 | Published: 14 Sep 2017
Get This Now


One System that can Give You Protection, Performance, and Quick Response
sponsored by Symantec
RESOURCE:Click inside to discover a program that can give you protection in a single agent, reducing complexity while delivering high performance and an orchestrated response.
Posted: 01 Sep 2017 | Published: 01 Sep 2017
Get This Now

TOPICS: 

A New Dawn For Data Privacy
sponsored by Symantec
RESOURCE:At GDPR's core is the idea of privacy as a fundamental right, along with radical changes in the way organizations are required to manage data. Check out this infographic to start preparing your organization for the 2018 deadline.
Posted: 23 Aug 2017 | Published: 23 Aug 2017
Get This Now


Data Loss Prevention – Now with CASB
sponsored by Symantec
WHITE PAPER:Data is often maliciously targeted through cloud applications. This resource will help you determine strategies for using DLP and CASB to protect your company in the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016
Get This Now


Endpoint Protection
sponsored by Symantec
WHITE PAPER:As the threat environment evolves quickly and becomes more complex, organizations are struggling to keep up. Check out this white paper to learn more about the essential capabilities for boosting endpoint security.
Posted: 22 Aug 2017 | Published: 22 Aug 2017
Get This Now


Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER:Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017
Get This Now


How the Williams Martini Racing Team Protects its Data
sponsored by Symantec
CASE STUDY:Check out this case studying exploring how Williams Martini Racing overcame the challenge of securing high-value data by implementing endpoint, web, and data center protection.
Posted: 18 Aug 2017 | Published: 31 Dec 2016
Get This Now


Enterprise Cloud Applications & Services Adoption, Use, and Threats
sponsored by Symantec
RESEARCH CONTENT:This special "Shadow Data Research Report" addresses the challenges faced when securing data in cloud apps and services specific to Shadow. Plus the report covers the potential repercussions of data leakage including compliance and mitigation costs that we guarantee you'll never want to face.
Posted: 08 Aug 2017 | Published: 08 Aug 2017
Get This Now


Internet Security Threat Report
sponsored by Symantec
WHITE PAPER:In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017
Get This Now


1 - 25 of 40 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement