IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security White Papers (View All Report Types)
The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
WHITE PAPER: From 2016-2017, nearly 1 million U.S. businesses fell victim to ransomware, resulting in an estimated 11 million hours of downtime, according to Datto. This e-book offers an essential cybersecurity guide for SMBs.
Posted: 23 Feb 2018 | Published: 23 Feb 2018

Datto, Inc.

Automate Firewall Change Management
sponsored by Skybox Security
WHITE PAPER: This white paper examines the current challenges in managing firewall changes, the typical firewall change management cycle and the concepts of an automate workflow system that addresses these challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

The Five Essential Capabilities Of An Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: This white paper outlines how you can gain visibility into potential vulnerabilities by adopting an analytics-driven SOC. Read on to find 5 capabilities that are "must-haves" in this type of system.
Posted: 02 Mar 2018 | Published: 02 Mar 2018


2018 Security Predictions
sponsored by Splunk
WHITE PAPER: What will the future bring for security? This resource offers predictions for 2018, such as how machine learning and DevSecOps will impact and benefit security strategies.
Posted: 08 Feb 2018 | Published: 08 Feb 2018


The Ultimate Guide to BYOD
sponsored by MobileIron
WHITE PAPER: The ultimate challenge of any BYOD program is not just managing data security or optimizing end-user productivity. It's maintaining a constant balance between security, compliance, legal liability, cost concerns and a positive user experience. Download this guide for 8 key areas to focus to ensure a successful mobile strategy in your organization.
Posted: 23 Mar 2018 | Published: 23 Mar 2018


How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017


All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement