All resources sponsored by:

ShieldX

17 Matches
Hyperautomated AI-based Security vs VMware NSX
sponsored by ShieldX
DATA SHEET:In this sheet, discover how to secure the modern, multi-cloud data center with hyperautomated AI-based security and compare it to a different network security offering in the market.
Posted: 16 Mar 2020 | Published: 16 Mar 2020
Get This Now


How to Configure ShieldX Microsegmented Least Privilege ACLs with Advanced Security Controls
sponsored by ShieldX
VIDEO:View this ShieldX demonstration of microsegmentation with least privilege ACLs for zero trust security in multi-cloud and/or on prem environments.
Posted: 14 Feb 2020 | Premiered: 14 Feb 2020
Get This Now


ACLs Are Not Enough - Achieving Zero Trust by Extending Least Privilege
sponsored by ShieldX
VIDEO:In this video, see how the application of ShieldX Least Privilege Access Control is extended to network Layer 7 to achieve zero trust security.
Posted: 14 Feb 2020 | Premiered: 14 Feb 2020
Get This Now


IDT: ShieldX Customer Testimonial
sponsored by ShieldX
VIDEO:View this customer testimonial video to see how IDT Telecom saw security success with ShieldX.
Posted: 13 Feb 2020 | Premiered: 13 Feb 2020
Get This Now


APEIRO Micro-Segmention - ACLs and Least Privilege to L7
sponsored by ShieldX
VIDEO:Micro-segmentation must adhere to the “organizing principle” of least privilege.What does that mean exactly? View this video to find out.
Posted: 13 Feb 2020 | Premiered: 13 Feb 2020
Get This Now


Cloud Security with ShieldX: Doing More Security While Spending Less
sponsored by ShieldX
CASE STUDY:IDT Telecom needed to secure its own infrastructure, as well as the companies they acquired. This meant added complexity and decreased visibility due to extremely diverse environments as well as different defensive strategies that needed consolidation. Read on to learn how ShieldX helped them meet their cloud security objectives.
Posted: 28 Jan 2020 | Published: 28 Jan 2020
Get This Now


CISO Guide to Ransomware Prevention in the Data Center
sponsored by ShieldX
WHITE PAPER:In the CISO Guide to Ransomware Prevention in the Data Center discover tips on crafting a ransomware defense strategy using microsegmentation.
Posted: 28 Jan 2020 | Published: 28 Jan 2020
Get This Now


CISO’s Guide to DevOps: Learning to Cooperate with DevOps
sponsored by ShieldX
WHITE PAPER:Today’s CISOs are under pressure to establish data security protocols while enabling an agile development environment. The following guide is a checklist designed to help CISOs with the issue of incorporating security into DevOps. Read on for tips and tricks on improving how you work with DevOps.
Posted: 27 Jan 2020 | Published: 31 Oct 2018
Get This Now


CISO’s Guide to Multicloud Security
sponsored by ShieldX
WHITE PAPER:As IT security leaders struggle to keep pace with advancing technology and increasing threats within multicloud environments, adopting an agile approach to cloud security may help solve the problem. In the following guide, uncover a checklist that features recommendations for CISOs interested in bolstering their cloud security strategy.
Posted: 27 Jan 2020 | Published: 31 Oct 2018
Get This Now


Machine Learning for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER:Learn how your organization could significantly improve security and decrease total cost of ownership with a micro-segmentation solution that employs machine learning.
Posted: 24 Jan 2020 | Published: 24 Jan 2020
Get This Now


A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER:Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018
Get This Now


A CISO’s Guide to Micro-Segmentation
sponsored by ShieldX
WHITE PAPER:Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. Download this guide for a comprehensive checklist that can help take the pain out of micro-segmentation adoption.
Posted: 23 Jan 2020 | Published: 31 Oct 2018
Get This Now


Security Controls for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER:With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.
Posted: 23 Jan 2020 | Published: 30 Sep 2017
Get This Now


How to Use Evaluation Factors to Select the Best Microsegmentation Model
sponsored by ShieldX
ANALYST REPORT:Security and risk management leaders deploying microsegmentation face difficult technical choices, which can be facilitated by Gartner's 4 microsegmentation models. Download Gartner’s research to select which of the 4 models is best suited to your enterprises' needs.
Posted: 12 Nov 2019 | Published: 12 Nov 2019
Get This Now


5 Best Practices in Cloud Security for Aviation
sponsored by ShieldX
WHITE PAPER:It can be challenging for all industries, including aviation, to apply conventional information security principles to the cloud. This white paper outlines 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.
Posted: 15 Oct 2019 | Published: 15 Oct 2019
Get This Now


5 Best Practices in Cloud Security
sponsored by ShieldX
EBOOK:Download this e-book for 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.
Posted: 15 Oct 2019 | Published: 15 Oct 2019
Get This Now


5 Best Practices in Cloud Security for Legal
sponsored by ShieldX
WHITE PAPER:Everyone is moving to the cloud. But unfortunately, cloud adoption is moving too fast for security to keep up. This e-book outlines a series of best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud. Read on for 5 best practices these customers have shared.
Posted: 14 Oct 2019 | Published: 14 Oct 2019
Get This Now


17 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info