IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed   
Information Security Threats White Papers (View All Report Types)
 
EUC Security for Work-from-Home
sponsored by TierPoint
WHITE PAPER: End user computing (EUC) allows users to access data from a centralized, enterprise-class data center where it is professionally managed, monitored and backed up. But centralizing data alone won’t protect your organization from a growing plethora of cyberthreats. So, how can you better protect your end users? Read this white paper to find out.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

TierPoint

Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs
sponsored by Dell SecureWorks
WHITE PAPER: Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.
Posted: 19 Oct 2020 | Published: 31 May 2020

Dell SecureWorks

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Assuring the Promise of a Secure 5G Future: 5 Steps to Taming the Complexity and Exploiting 5G Opportunities
sponsored by Spirent
WHITE PAPER: 5G will radically improve mobile broadband services, enable connectivity to billions of global devices and create an IoT boom. So what’s holding up 5G deployment in real-world use cases? The answer is security – particularly in that 5G networks need to be tested and validated. Read this white paper to learn 5 steps to 5G security.
Posted: 16 Oct 2020 | Published: 31 Jul 2019

Spirent

The Key Pillars For Protecting Sensitive Data In Any Organization
sponsored by Thales
WHITE PAPER: This white paper, The Key Pillars For Protecting Sensitive Data In Any Organization, outlines the challenges of modern data security, as well as best practices for protecting critical data – read on to learn more.
Posted: 04 Nov 2020 | Published: 30 Sep 2020

Thales

Securing SMBs in a World of Digital Transformation
sponsored by Claranet
WHITE PAPER: The era of digital transformation demands similar growth in security capabilities as well. While large enterprises have the resources to invest heavily in this area, small and medium businesses (SMBs) must be a bit more resourceful. Read this white paper, which highlights cybersecurity guidance for SMBs in the era of digital transformation.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Six IT Security Risks In A Perimeterless World
sponsored by CyberArk Software, Inc
WHITE PAPER: As organizations move away from data centers towards cloud environments, traditional perimeter security approaches become obsolete. So, how can organizations protect their data in a post-perimeter world? Read this white paper to learn more about the security risks and opportunities in the cloud era.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

CyberArk Software, Inc

Return to Work Safely
sponsored by BlackBerry
WHITE PAPER: This white paper provides an in-depth look at BlackBerry AtHoc, a crisis incident communications platform designed to help organizations communicate, collaborate and react decisively to any incident, event or emergency situation
Posted: 20 Oct 2020 | Published: 20 Oct 2020

BlackBerry

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Modernize Your Video Security Solution with AI and Analytics
sponsored by Motorola, Inc.
WHITE PAPER: Within the next 5 years, there will be around 45 billion cameras on Earth. This abundance of information and data far outweighs our ability to process and analyze all this information on our own. In this white paper, learn about Motorola’s Avigilon, an assistive AI technology that helps security operators to detect critical events.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Motorola, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info