Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Nanny

RSS Feed   
Internet Nanny White Papers (View All Report Types)
 
BEST PRACTICES DNS: The First Principle Of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Infoblox

Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: SOCs are a critical aspect to effectively identifying and addressing potential threats – however the evaluation process and subsequent RFP drafting process can be overwhelming with the amount of available options. The following white paper provides evaluation best practices and tips to guide RFP drafting to help you get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Cysiv

WHY LACK OF APPLICATION SECURITY SKILLS AND EXPERTS HAMSTRINGS DIGITAL TRANSFORMATION INITIATIVES
sponsored by Contrast Security
WHITE PAPER: Over the past year, 73% of organization had at least one intrusion or breach due to a gap in cybersecurity skills – 47% had three or more such events. Download this white paper to take a deep dive into this issue, all by the numbers, as well as some ways to overcome outdated modes of application security to push digital transformation initiatives.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Contrast Security

Successful Network And Security Transformation Powers The Digital Enterprise
sponsored by Silver Peak
WHITE PAPER: Transform your WAN & security architectures to realize the full promise of the cloud.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

Silver Peak

A DIGITAL PRESCRIPTION FOR HEALTHCARE’S TECHNOLOGY CHALLENGES
sponsored by HPE and Intel®
WHITE PAPER: The global COVID-19 pandemic has been a disruption unprecedented in our lifetimes, and healthcare providers around the world have been sorely tested. But challenges within the industry were visible long before this. Read this white paper to learn how healthcare providers are embracing solutions like HPE GreenLake and conquering these challenges.
Posted: 18 Jun 2021 | Published: 18 Jun 2021

HPE and Intel®

Exploiting a Pandemic: Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER: COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Sase A Changing World Calls For A Different Kind Of Network
sponsored by VMware
WHITE PAPER: When it comes to digitization, legacy networks are simply not up to the task. The connections of these hub-and-spoke legacy networks are fixed, and the transit of data is limited due to lack of flexibility. Today, SASE’s cloud-based architecture can support networking and security needs. Access this ZK Research white paper to see how SASE works.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

VMware

Automate Data Security
sponsored by Red Hat
WHITE PAPER: Financial services firms must comply with a range of increasingly strict security and privacy standards. However, using joint solutions can take a DevSecComplianceOps approach to automate application building, testing, and deployment. View this white paper to learn more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Red Hat

Omdia Market Radar: Outbound Email Security
sponsored by Zivver
WHITE PAPER: When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Zivver

How Continuous, Automated Red-Teaming Can Elevate Your Security Posture
sponsored by Randori
WHITE PAPER: Security teams are recognizing that a continuously evolving IT ecosystem demands a shift in tactics. Continuous, automated red team testing can help enterprises adopt a risk-based and adversary-focused security approach to ensure that they are prepared to defend against evolving threats. Dive into this S&P Global brief to get the specifics.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences