IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration White Papers (View All Report Types)
 
The Missing Link in Website Security
sponsored by Tala Security
WHITE PAPER: Traditional back-end website security technologies are ineffective at maintaining security in today’s threat landscape – especially considering the additional pressures of regulatory requirements. In this white paper, take a look at the key gaps in the website security environment and explore ways to rethink current tactics.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Tala Security

The Importance of Cybersecurity for Executives
sponsored by A-Lign
WHITE PAPER: As security threats become increasingly frequent, complex and disruptive, it’s critical for all leaders – not just the CIO, CTI and CISO – of an organization to play a role in ensuring security. In this white paper, explore the importance of cybersecurity for executives by looking at the common types of attacks and how to prevent them.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

A-Lign

Transform the Customer Experience with a Modern Customer IAM Solution
sponsored by Okta
WHITE PAPER: Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Six Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

IBM

Splunk IT Security Predictions 2020
sponsored by Splunk
WHITE PAPER: Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Splunk

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

Executive Summary 2019 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Thales

Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium

BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

Consumer Identity Management for the CMO, CISO, and CIO
sponsored by Okta
WHITE PAPER: As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info