Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Filtering Software

RSS Feed   
Filtering Software White Papers (View All Report Types)
 
Spear Phishing: The Targeted Attacks that Aim for Your Business
sponsored by Vade Secure
WHITE PAPER: Phishing and spear phishing are two of the most common types of cyberattacks. In a growing digital economy, technological assets are coming under greater threat from these two very similar attacks. How do you identify a phishing attack, and how can you take a proactive approach? Read this white paper to learn the answers.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


Maintaining Business Momentum In The Face Of Forced Change: The Active Directory Angle
sponsored by Quest
WHITE PAPER: With the frantic pace of today’s business world, organizations struggle to keep up with requests to create, change and remove access to their on-premises AD. This scenario becomes even more complicated when you mix in a hybrid AD environment. Read this white paper to learn why properly-tuned AD lifecycle management is crucial for handling change.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Quest

Cloud Usage in the Financial Services Sector
sponsored by McAfee
WHITE PAPER: The following report, Cloud Usage in the Financial Services Sector, provides a closer look at the results of a Cloud Security Alliance survey designed to identify the challenges, risks and best practices for the development, deployment and management of secure cloud services in the financial services industry – read on to view the findings.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

McAfee

Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs
sponsored by Dell SecureWorks
WHITE PAPER: Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.
Posted: 19 Oct 2020 | Published: 31 May 2020

Dell SecureWorks

Endpoint Security for Smart Manufacturing: Protection from the Factory Floor To the Supply Chain
sponsored by BlackBerry
WHITE PAPER: Manufacturers have embraced digital transformation, which means they’re now capturing more and more data on many new and different types of endpoints, both in their factories and throughout their logistics channels. But with all that data comes added security risks. Jump into this white paper to look at these threats and their implications.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

BlackBerry

Top 10 Reasons for Migrating to CipherTrust Manager for KeySecure Customers
sponsored by Thales
WHITE PAPER: For years, the KeySecure platform has equipped organizations with key management and data protection capabilities across their organizations. The following white paper highlights 10 reasons why KeySecure users should switch over to Thales’s next-gen CipherTrust manager – read on to learn more.
Posted: 26 Oct 2020 | Published: 30 Jun 2020

Thales

Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility
sponsored by Barracuda
WHITE PAPER: With enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.
Posted: 09 Oct 2020 | Published: 30 Sep 2020

Barracuda

Understanding Phishing: Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys

All Together Now: IT & Security Collaboration
sponsored by ServiceNow
WHITE PAPER: 2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info