Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Infrastructure Security Spending

RSS Feed   
Infrastructure Security Spending Multimedia (View All Report Types)
 
Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

The State of Election Security
sponsored by WhiteHat Security
WEBCAST: The topics of voter registration and election security were top-of-mind in 2020 – but what did we learn that we can use to better ourselves going forward? Watch this webinar, which overviews the state of election security, common threats, and best practices.
Posted: 30 Nov 2020 | Premiered: Nov 30, 2020

WhiteHat Security

Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST: The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020

Ionic Security

The importance of identity in securing your business
sponsored by Okta
VIDEO: Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.
Posted: 17 Sep 2020 | Premiered: 17 Sep 2020

Okta

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

Certification Completion
sponsored by SailPoint Technologies
VIDEO: In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

Office 365: Data Protection & Backups
sponsored by arcserve
VIDEO: Migrating to Office 365 equips organizations with the benefits of modern cloud environments. However, there are some challenges and considerations you need to be aware of, especially when it comes to data privacy and backups. Watch this short video to learn more.
Posted: 30 Nov 2020 | Premiered: 30 Nov 2020

arcserve

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
VIDEO: Given the implications of a successful cyberattack, the need for effective threat detection and response has never been more urgent. In this short webinar, the Chief Technical Officer at Cysiv provides an overview of how threat detection and SIEM objectives can benefit from the use of data science. Watch now to learn more.
Posted: 19 Aug 2020 | Premiered: 19 Aug 2020

Cysiv

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences