IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed   
Management of Security White Papers (View All Report Types)
 
Integrating Password and Privilege Management for Unix and Linux Systems
sponsored by BeyondTrust Corporation
WHITE PAPER: With the knowledge that cyberattacks are often targeted towards accounts with privileged access, organizations often include privileged access management (PAM) at the top of their project list. This report uncovers why PAM strategies are critical to a robust security program.
Posted: 06 Nov 2019 | Published: 31 Jan 2019

BeyondTrust Corporation

Secure by Design: A Roadmap to Cybersecurity Success
sponsored by Cyberfort
WHITE PAPER: The changing threat landscape, at first glance, seems complicated. However, there are methods to mitigate threats that will not adversely impact your business operations. In this white paper, learn how to assess your security posture and provide the tools necessary to enable your organization to take a more holistic approach to cybersecurity.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Cyberfort

The Four Pillars of Modern Vulnerability Management
sponsored by Rapid7
WHITE PAPER: In this white paper, discover a comprehensive approach to reducing vulnerabilities across your ecosystem.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Rapid7

Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

Securing Your SWIFT Environment Using Micro-Segmentation
sponsored by Illumio
WHITE PAPER: All SWIFT customers must self-attest to their compliance with the SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations. In this white paper, explore 3 challenges that prove especially difficult for SWIFT customers looking to achieve compliance.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

Protecting Privileged Access Is Critical to the Protection of a Company’s Crown Jewels
sponsored by CyberArk Software, Inc
WHITE PAPER: In this infographic from Privileged Access Security for Dummies, discover some tips & best practices when it comes to protecting your company’s data. Learn how to: Secure critical information, reduce cyberattack risk, and take preventative security action.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

CyberArk Software, Inc

Elevating Enterprise Security with Fidelis Cybersecurity: Network and Deception
sponsored by Fidelis
WHITE PAPER: As organizations adopt cloud technologies and regulatory requirements, networks grow increasingly complex. Security teams are finding it difficult to defend their networks without holistic insight into the environment. Does your security team have the visibility and investigative ability to defend your network? Read on to find out.
Posted: 01 Nov 2019 | Published: 30 Sep 2019

Fidelis

Addressing Challenges in Hybrid Cloud Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Trend Micro, Inc.

5 Considerations for Evaluating a Modern Enterprise Security Platform.
sponsored by Verizon
WHITE PAPER: Security teams will be stretched thin. The jobs they perform will become increasingly more complex given the continued proliferation of attacks. To meet these challenges, practitioners are considering new solutions and approaches. Download this white paper to explore 5 considerations for evaluating a modern enterprise security platform.
Posted: 03 Sep 2019 | Published: 28 Feb 2019

Verizon

Supporting Cybersecurity & Privacy Standards with ITAM
sponsored by Snow Software
WHITE PAPER: Cybersecurity is now a priority across the entire business, from the board-level down as companies increasingly rely on operating models that require data sharing. With company reputations hanging in the balance, it’s essential that organizations align their policies around data handling and cybersecurity. Read on to learn more.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

Snow Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement