IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security White Papers (View All Report Types)
 
Software Security Is Not Keeping Pace with Technology in the AutoIndustry
sponsored by Synopsys
WHITE PAPER: Discover this survey of the current cybersecurity practices in the automotive industry to fill a gap that has existed far too long—the lack of data needed to understand the automotive industry's cybersecurity posture and its capability to address software security risks inherent in connected, software-enabled vehicles.
Posted: 03 May 2019 | Published: 03 May 2019

Synopsys

Big Data Analytics - Security and Compliance Challenges in 2019
sponsored by comForte AG
WHITE PAPER: There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.
Posted: 13 May 2019 | Published: 30 Apr 2019

comForte AG

The Case for Open Source IAM
sponsored by WSO2, Inc.
WHITE PAPER: Open source IAM solutions are now gaining attention from enterprises similar to proprietary and commercial IAMs. Why? In this white paper, learn all about the benefits and use cases of open source for IAM today.
Posted: 13 May 2019 | Published: 13 May 2019

WSO2, Inc.

Using Indicators to Deal with Security Attacks
sponsored by ManageEngine
WHITE PAPER: Download this white paper to understand the unique capabilities of these indicators, the differences between them, and the steps to configure a SIEM platform to detect indicators of compromise (IoCs) and indicators of attack (IoAs).
Posted: 09 May 2019 | Published: 09 May 2019

ManageEngine

Adopting Splunk's Analytics-Driven Security Platform as Your SIEM
sponsored by Splunk
WHITE PAPER: Read this white paper to learn why analytics integrated into a modern SIEM solution can turn your masses of machine data into unrivaled threat intelligence that catches attacks before they happen.
Posted: 03 Jun 2019 | Published: 31 Dec 2018

Splunk

What are your Public Cloud Security Risks?
sponsored by Lacework
WHITE PAPER: There are many good business reasons why the public cloud has become a go-to environment for fast infrastructure expansion. But is it secure? Read on to learn about the cloud's unique security challenges and how continuous, real-time monitoring, analysis, and alerting can help your organization stay secure.
Posted: 29 May 2019 | Published: 29 May 2019

Lacework

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Maximizing SOC Effectiveness and Efficiency with Integrated Operations and Defense
sponsored by NetScout Systems, Inc.
WHITE PAPER: The most successful security programs are rarely the ones with the largest security budgets or staffs. The effectiveness of security operations increases by leveraging existing resources in more productive ways. In this white paper, explore leverage areas for assuring SOC success while taking advantage of integration opportunities.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. As a result, organizations that want to protect their confidential data and comply with laws and regulations are often unsure where to turn. In this white paper, explore a 9-step process for implementing and executing a data protection strategy.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Forcepoint

Turbocharge ITOps Productivity for Security and Efficiency
sponsored by BMC
WHITE PAPER: It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.
Posted: 15 May 2019 | Published: 15 May 2019

BMC
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement