All resources sponsored by:

Forcepoint

22 Matches
Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST:Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019
Get This Now


Accelerate Cloud App Adoption without Compromising Security
sponsored by Forcepoint
WEBCAST:Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments – every cloud service has its own security framework, different APIs and different authentication mechanisms. In this webcast, learn how to gain full visibility into your cloud environment.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019
Get This Now


Rethinking Data Security with a Risk-adaptive Approach
sponsored by Forcepoint
WHITE PAPER:In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.
Posted: 06 Aug 2019 | Published: 30 Apr 2019
Get This Now


Supplementing the Limitations in Office 365
sponsored by Forcepoint
ANALYST REPORT:This Osterman Research report explores how you can use the native capabilities Office 365 provides as a starting point for your data protection strategy, and how you can implement a 3rd party service to help ensure all of your data is backed-up and recoverable.
Posted: 06 Aug 2019 | Published: 31 Mar 2018
Get This Now


Employing a Risk Adaptive Model to Detect and Prevent Threats From Within
sponsored by Forcepoint
WEBCAST:Striking a balance between maximizing productivity and minimizing risk requires a security program that can identify and respond to the insider threat. In this webcast Forcepoint Senior Security Strategist Homayun Yaqub, discusses the foundations that underpin an effective program. Watch now to learn more.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019
Get This Now


Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?
sponsored by Forcepoint
WEBCAST:In this webcast, Bharath Vasudevan from Forcepoint discusses how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment. The webcast will also explore how Forcepoint's solution, Dynamic Data Protection, delivers risk-adaptive protection.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019
Get This Now


Mastering Policy Setting and Control in the Cloud
sponsored by Forcepoint
WEBCAST:Join guest presenter Andras Cser, a Forrester Vice President and Principal Analyst, as he shares recommendations for securing data and mastering policy setting in the cloud.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019
Get This Now


Who Watches the Watchers?
sponsored by Forcepoint
VIDEO:Tune into this webcast as, Forcepoint Chief Scientist, Dr. Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it.
Posted: 11 Jun 2019 | Premiered: 11 Jun 2019
Get This Now


Modernize Your Data Protection
sponsored by Forcepoint
WEBCAST:Navigating your data protection journey can be complex. In this webcast, Angelica Torres-Corral, Senior Product Marketing Manager at Forcepoint gives insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) software and adopting a more proactive security strategy.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019
Get This Now


The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER:There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. As a result, organizations that want to protect their confidential data and comply with laws and regulations are often unsure where to turn. In this white paper, explore a 9-step process for implementing and executing a data protection strategy.
Posted: 10 Jun 2019 | Published: 10 Jun 2019
Get This Now


Understanding the Limitations of Microsoft O365 Security
sponsored by Forcepoint
VIDEO:Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? In this webinar, discover Osterman Research key findings and what's driving these organizations' decisions, including, key priorities for securing O365, barriers to adoption and full migration of users, and more.
Posted: 29 May 2019 | Premiered: 29 May 2019
Get This Now


Mastering Policy Setting and Control in the Cloud
sponsored by Forcepoint
VIDEO:Join guest presenter Forrester Vice President, Principal Analyst serving Security and Risk professionals, Andras Cser as he shares their recommendations for securing data and mastering policy setting.
Posted: 28 May 2019 | Premiered: 28 May 2019
Get This Now


The State of the CASB Market
sponsored by Forcepoint
VIDEO:In this webcast, CEO and Osterman Research founder Mike Osterman shares the results of his survey on how organizations are using, or planning to implement, CASB solutions. Tune into this webinar to learn more about the need for CASBs in today's organizations.
Posted: 28 May 2019 | Premiered: 28 May 2019
Get This Now


What to Look for in a CASB
sponsored by Forcepoint
VIDEO:You need a CASB, but there are so many products to choose from. So what features should you actually care about? Find out in this short video.
Posted: 24 May 2019 | Premiered: 24 May 2019
Get This Now


Securing your Cloud Applications
sponsored by Forcepoint
VIDEO:The average enterprise customer uses over 1,000 cloud apps, including SaaS, IaaS, or homegrown cloud apps. To mitigate security risks, IT leaders must ensure assets in these cloud environments are secure. View this webcast to learn how to gain insight into employee cloud app use, receive automated threat prevention and more with Forcepoint CASB.
Posted: 24 May 2019 | Premiered: 24 May 2019
Get This Now


A Guide to Achieving SaaS Security and Compliance
sponsored by Forcepoint
WHITE PAPER:The nature of today's organizations is being driven by employees' demands for greater flexibility, productivity, and mobility. While SaaS applications fulfill these user demands, they also pose visibility and control challenges for IT. In this white paper, learn how SaaS applications can be effective at meeting users' needs without posing risks.
Posted: 14 May 2019 | Published: 14 May 2019
Get This Now


Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT:Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018
Get This Now


The Importance of Choosing the Right CASB Solution
sponsored by Forcepoint
RESEARCH CONTENT:In this research report, explore key takeaways from an in-depth survey conducted by Osterman Research. This survey asked 174 decision-makers at companies that already have, or are in the process of deploying cloud access security broker software about their experiences.
Posted: 03 May 2019 | Published: 31 Dec 2018
Get This Now


Rethinking Data Security With a Risk-Adaptive Approach
sponsored by Forcepoint
WHITE PAPER:In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.
Posted: 29 Mar 2019 | Published: 26 Apr 2018
Get This Now


Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER:Learn how Data Loss Prevention vendors like Symantec, Forcepoint, McAfee, Digital Guardian, and more stack up to see which one is right for your organization.
Posted: 01 Feb 2019 | Published: 01 Feb 2019
Get This Now


How Security Solutions Enable Cloud Success
sponsored by Forcepoint
WHITE PAPER:Unsurprisingly, security concerns still rank as the number one reason for not using cloud services, according to IDC. To learn more, download this e-book for 5 key security considerations and best practices for safe cloud adoption.
Posted: 26 Oct 2018 | Published: 26 Oct 2018
Get This Now


Understanding Office 365 Security Concerns
sponsored by Forcepoint
WHITE PAPER:Read this white paper for a look at the Office 365 adoption trend, security teams' greatest priorities and concerns, and how they are planning to tackle them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018
Get This Now


22 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement