IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed   
Managing Security White Papers (View All Report Types)
 
The Essential Guide to Foundational Security Procedures
sponsored by Splunk
WHITE PAPER: Download your complimentary copy of “The Essential Guide to Foundational Security Procedures” to learn how to build standard security procedures, respond to threats quickly with orchestrated workflows, and leverage Splunk Phantom for orchestration and automation.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Splunk

COMFORTE AG SECUREDPS: PCI DSS TECHNICAL ASSESSMENT
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

The Enterprise Technology Orchestration Guide To Infosec
sponsored by Oomnitza
WHITE PAPER: The security aspect of IT asset management (ITAM) cannot be understated. Especially today – when resources are spread out and harder to keep an eye on. Technology orchestration gives your enterprise the opportunity to let IT take care of itself, tightening security and simplifying management. View this white paper to learn more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

Oomnitza

KuppingerCole Market Compass IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 12 Oct 2020 | Published: 21 Jul 2020

ServiceNow

The Changing Face of Data Security: 2020 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.
Posted: 13 Jul 2020 | Published: 31 Mar 2020

Thales

Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: The NIST Cybersecurity Framework outlines 5 functions that, when implemented properly, help organizations drive efficiency while ensuring data security. In this whitepaper focuses on how the NIST Cybersecurity Framework can – and should – be implemented to address the rising cybersecurity challenges in the public sector.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Absolute Software Corporation

How Cyberattack Simulations Differ From Penetration & Vulnerability Tests
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

BLUEPRINT: MODERN LAYERED SECURITY
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Why Security is Now a Critical Component of Application Delivery
sponsored by Radware
WHITE PAPER: Because today’s threats can be so costly, combining application protection with application delivery has become mission-critical. Radware Alteon is an application delivery solution that integrates web application firewall (WAF), bot management and automation to ensure apps stay secure. Jump into this solution brief for a product overview.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences