All resources sponsored by:

Armor

21 Matches
Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER:Organizations are under constant threat from a barrage of scans and attacks delivered across IP traffic. In this white paper, learn how Armor's Dynamic Threat Block (DTB) is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack.
Posted: 08 May 2019 | Published: 08 May 2019
Get This Now


Leading the Way With Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY:According to the 2018 Verizon Data Breach Report, the hospitality industry is one of the top five industries subjected to network breaches every year. Learn how OpenKey, a company leading the way with secure mobile keyless hotel access, was able to securely host their customer data with a private cloud provider.
Posted: 07 May 2019 | Published: 07 May 2019
Get This Now


Exploring the Past, Present, And Future of Blockchain Technology
sponsored by Armor
WHITE PAPER:Since its early applications in cryptocurrency, blockchain implementations have focused on keeping data secure. But the journey of blockchain technology now stretches beyond Bitcoin. For businesses, blockchain implementations can provide a secure way to store and track transactions. In this white paper, learn more about blockchain technology.
Posted: 07 May 2019 | Published: 07 May 2019
Get This Now


New Survey Reveals Small and Mid-Size Enterprises Are Making Big Strides in Cybersecurity, But Big Decisions Loom Ahead
sponsored by Armor
RESEARCH CONTENT:Recently, many SMEs have shown an increased awareness of the potential impact that a security breach could have on their organization. As a result, many SMEs have invested significant efforts towards improving their cybersecurity. In this research report, explore the advancements organizations have made and challenges they still face.
Posted: 06 May 2019 | Published: 31 Oct 2018
Get This Now


Achieving Hitrust Certification with Impenetrable Cloud Security
sponsored by Armor
CASE STUDY:As a SaaS provider of population health and care management technology and services, Medecision made the commitment to meet the most rigorous standards and protocols available, including achieving HITRUST CSF certification. In this case study, learn how Medicison was able to achieve the certification by deploying Armor Anywhere.
Posted: 06 May 2019 | Published: 06 May 2019
Get This Now


Secure Neuroscience Technology for Better Brain Health
sponsored by Armor
CASE STUDY:After Cambridge Cognition decided to host data in the cloud, they faced the challenge of weather they could guarantee the security of information at rest and in transmission. In this case study, learn how they were able to secure their data by deploying Armor's secure cloud hosting platform.
Posted: 03 May 2019 | Published: 03 May 2019
Get This Now


A Startup Built to Revolutionize Injury Recovery
sponsored by Armor
CASE STUDY:As SaRA Health plotted its growth leveraging the public cloud, its leadership realized that layering cybersecurity on top of their cloud service was the best bet for ensuring their security needs were met. In this case study, learn how they used Armor as a third-party provider to handle their cybersecurity and compliance needs.
Posted: 03 May 2019 | Published: 03 May 2019
Get This Now


Armor Monitored Web Application Firewall
sponsored by Armor
PRODUCT OVERVIEW:In this resource, learn about the Armor monitored WAF and how it gives you control over which traffic to allow or block to your web applications by defining customizable web security rules to stop OWASP Top 10 application attacks including SQL injections (SQLi), XML external entity (XXE) attacks, and cross-site scripting (XSS) attacks.
Posted: 02 May 2019 | Published: 02 May 2019
Get This Now


Security Operations Center: Build It Or Buy It
sponsored by Armor
WHITE PAPER:Organizations have come to realize the only way to protect their networks around the clock is with a security operations center (SOC). This white paper can help you decide whether to build or buy a SOC by exploring the staffing, technology, and costs required to operate a successful SOC.
Posted: 02 May 2019 | Published: 30 Nov 2018
Get This Now


Armor File Integrity Monitoring (FIM)
sponsored by Armor
WHITE PAPER:When traditional firewalls or IDS fail to prevent or detect a threat, monitoring operating system and application changes at the host level provides an additional layer of security. In this white paper, learn more about Armor's File Integrity Monitoring which watches your hosts for unauthorized activities to detect potential threats.
Posted: 01 May 2019 | Published: 01 May 2019
Get This Now


Leading International Fintech Businesses in Consumer Credit
sponsored by Armor
CASE STUDY:As the Quint Group continued its global expansion, it was critical that the platforms supporting the business were secure and scalable. As a result, they were looking for a new platform that had security built in. In this case study, learn why the Quint Group decided to move their infrastructure to Armor.
Posted: 01 May 2019 | Published: 01 May 2019
Get This Now


Case Study: New York Cruise Lines & Armor Cloud Security
sponsored by Armor
CASE STUDY:The New York Cruise Lines wanted to ensure they provided guests with online resources. However, with every new web-facing resource, there's an increased risk of a data breach. In this case study, learn how the New York Cruise Lines were able to secure their hybrid cloud infrastructure by implementing Armor's managed security provider.
Posted: 30 Apr 2019 | Published: 30 Apr 2019
Get This Now


Hybrid Cloud Company Armors its Defenses
sponsored by Armor
CASE STUDY:In today's business environment, security must be an integral consideration for all organizations. With that in mind, a large technology service provider wanted to ensure that its infrastructure was properly secured. In this case study, explore why the service provider chose to implement Armor Anywhere, Armor's cloud-based security-as-a-service.
Posted: 30 Apr 2019 | Published: 30 Apr 2019
Get This Now


Astute Solutions: Minimizing PCI Scope While Securing Stored Sensitive Data
sponsored by Armor
CASE STUDY:Astute is a consumer-engagement software company. In the past, Astute's customers didn't need to store cardholder data. But as the demand for instant payments increased, it became clear that it was no longer avoidable. In this case study, learn why Astute decided to implement Armor's TokenEx platform to help protect sensitive data.
Posted: 29 Apr 2019 | Published: 29 Apr 2019
Get This Now


Naked Data
sponsored by Armor
WHITE PAPER:There have been many examples where organizations exposed files including sensitive consumer data. The exposures raised the specter of the cloud having no tolerance for innocent mistakes. However, cloud security posture management tools can help you avoid being another example of what can go wrong. Download this white paper to learn how.
Posted: 29 Apr 2019 | Published: 30 Apr 2019
Get This Now


Security-as-a-Service Has Arrived
sponsored by Armor
WHITE PAPER:From underneath the managed security umbrella, security-as-a-service (SECaaS) has emerged with a combination of technologies that leverage the capabilities of the cloud to deliver threat detection, remediation, and agility to companies. In this white paper, learn how if implemented correctly, SECaaS could be the answer to your cybersecurity needs.
Posted: 26 Apr 2019 | Published: 31 Jan 2019
Get This Now


The Black Market Report: A Look Inside the Dark Web
sponsored by Armor
WHITE PAPER:This Black Market Report reveals a snapshot of the type of activity threat actors are participating in every day, as well as valuable insights into what type of tools and services are popular among criminals.
Posted: 18 Jun 2018 | Published: 18 Jun 2018
Get This Now


Selecting Secure Hosting Services: Ultius case example
sponsored by Armor
CASE STUDY:In a GDPR world, it's essential for you to have a secure cloud hosting provider with threat management capabilities to bolster confidence among any users who trust you with either payment or identity related information.
Posted: 18 Jun 2018 | Published: 18 Jun 2018
Get This Now


Dwell Time as a Critical Security Success Metric
sponsored by Armor
WHITE PAPER:Find out how security professionals can more accurately measure and report on dwell times so that they can identify when a threat enters their environment and work to remediate it faster.
Posted: 15 Jun 2018 | Published: 15 Jun 2018
Get This Now


The Honeypot Project
sponsored by Armor
WHITE PAPER:As the cloud gains momentum, protecting sensitive data no longer means simply safeguarding on-premises infrastructure. Take a look at this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses.
Posted: 09 Mar 2018 | Published: 09 Mar 2018
Get This Now


The Cloud: Securing Your Enterprise both Before and After Migration
sponsored by Armor
EGUIDE:In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.
Posted: 26 Jul 2016 | Published: 25 Jul 2016
Get This Now


21 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement