Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Information Security Spending

RSS Feed   
Information Security Spending White Papers (View All Report Types)
 
Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility
sponsored by Barracuda
WHITE PAPER: With enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.
Posted: 09 Oct 2020 | Published: 30 Sep 2020

Barracuda

Secure Hybrid Cloud: The Strategic Approach to Enterprise IT
sponsored by IBM
WHITE PAPER: This 451 Research Pathfinder report was written to help navigate IT and security decision-makers through specific issues related to hybrid cloud security technologies and provides recommendations & considerations throughout the decision-making process. Download the report to get started.
Posted: 31 Jul 2020 | Published: 31 May 2019

IBM

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

An overview of IBM’s identity & access management services
sponsored by IBM
WHITE PAPER: This Forrester study, commissioned by IBM, provides an unbiased look at the potential benefits, costs and risk areas of IBM’s Identity and Access Management (IAM) services. Download the report to unlock the key findings from the study and explore a use case that demonstrates the potential of adopting IBM’s IAM services
Posted: 06 Aug 2020 | Published: 06 Aug 2020

IBM

Mobile Malware and APT Espionage
sponsored by BlackBerry
WHITE PAPER: Mobile threats have been around nearly as long as the mobile phone, but these attacks continue to increase in volume and complexity – they even go so far as to be a primary target for state-sponsored espionage attacks. Read this research report for key insight and new intelligence regarding mobile malware and government espionage.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

BlackBerry

Security and IT Ops: Minding the IT Gaps Together
sponsored by Tanium
WHITE PAPER: Contrary to popular belief, security and IT operations have more in common than they think when it comes to business objectives – differences usually arise when it comes to strategic processes. The following white paper highlights those commonalities and explores avenues for collaboration between these two teams.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Tanium

Top 10 Considerations: Selecting an ID Card Printer that will Meet Your Needs
sponsored by HID Global
WHITE PAPER: Selecting a partner for producing secure ID badges is harder than it sounds – organizations need to take into account everything from managing access of the cards to credential durability and everything in-between. To help you get started, download this white paper, which highlights 10 consideration areas for choosing the right printer.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

HID Global

Identity Governance & Administration (IGA)
sponsored by SailPoint Technologies
WHITE PAPER: In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.
Posted: 04 Aug 2020 | Published: 30 Apr 2019

SailPoint Technologies

10 Cybersecurity Best Practices for Securing Remote Workers
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Arctic Wolf Networks, Inc.

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
WHITE PAPER: Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.
Posted: 17 Jul 2020 | Published: 22 Apr 2020

Cysiv
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info