IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security White Papers (View All Report Types)
 
5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date
sponsored by FireMon
WHITE PAPER: In this whitepaper, find 5 steps you can take to understand the current state of your network connections and ensure that the enforcement points designed to protect the environment remain up-to-date and carried out.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

FireMon

3 Ways Privacy Can Give Your Organization a Competitive Advantage
sponsored by Virtru
WHITE PAPER: Instead of viewing privacy regulation as a deadweight to business growth, privacy can be a significant competitive advantage, especially for early adopters. Discover 3 ways organizations that prioritize privacy are gaining a business advantage against their competition.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Virtru

The New Age of Fraud
sponsored by Concur Technologies
WHITE PAPER: Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.
Posted: 18 Sep 2019 | Published: 31 Aug 2019

Concur Technologies

3 Essential Components of a Managed Security Service for SMBs
sponsored by Avast Software
WHITE PAPER: This white paper examines the current attack surface for SMBs and looks at the 3 essential components of a managed security service, which include protection for data, devices, and people. Read on to learn more.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Avast Software

Countering Evasive Threats With Moving Target Defense
sponsored by Morphisec, Inc.
WHITE PAPER: Download this white paper to learn about Moving Target Defense (MTD) and how it leverages the tactics used by sophisticated attackers — deception, modification and polymorphism — to level the cybersecurity playing field.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Patch Management: Your Biggest Ally in the War Against Cybercrime
sponsored by Panda Security
WHITE PAPER: The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

Security for Microservices: Best Practices
sponsored by Aporeto
WHITE PAPER: Moving to a microservices framework and adoption of cloud-native services introduces new security considerations for developers, line-of-business owners, and security teams. In this white paper, explore best practices for security in a microservices environment.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement