IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security White Papers (View All Report Types)
 
The State of PKI Security and Management: Survey Report
sponsored by AppViewX
WHITE PAPER: A 2019 study has revealed that businesses’ PKI setups have a long way to go before they’re considered truly secure and effective. In this whitepaper, find the results of the study that reveal the state of PKI in the industry today – including some surprising statistics.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppViewX

Taking Steps to Protect Financial Mobile Applications
sponsored by Intertrust
WHITE PAPER: Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Core Principles of Cyber Hygiene in a World of Cloud and Mobility
sponsored by VMware
WHITE PAPER: Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news broadcast. In this white paper, learn how to address vulnerabilities before they become disastrous.
Posted: 22 Nov 2019 | Published: 15 Mar 2019

VMware

Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

The Missing Link in Website Security
sponsored by Tala Security
WHITE PAPER: Traditional back-end website security technologies are ineffective at maintaining security in today’s threat landscape – especially considering the additional pressures of regulatory requirements. In this white paper, take a look at the key gaps in the website security environment and explore ways to rethink current tactics.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Tala Security

ZeroNorth 2019 End of Year Report
sponsored by ZeroNorth
WHITE PAPER: 2019 has been a formative year in cybersecurity – growing security risks and compliance regulations put pressure on organizations to rethink their current strategy. This annual report highlights key statistics to show where the security landscape is trending to help you position yourself for success in 2020.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

ZeroNorth

Best Practices Award: Email Security Global
sponsored by Mimecast
WHITE PAPER: The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Mimecast

Okta Identity Management for Portals Built on Salesforce.com
sponsored by Okta
WHITE PAPER: Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info