Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices White Papers (View All Report Types)
1 - 25 of 778 Matches Previous Page  |  Next Page
BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

Top 5 Reasons to Automate Identity Lifecycle
sponsored by Okta
WHITE PAPER: As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Consumer Identity Management for the CMO, CISO, and CIO
sponsored by Okta
WHITE PAPER: As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Is Noise Pollution Making Your Data Less Secure?
sponsored by F5 Networks
WHITE PAPER: Automated attacks are increasing in frequency and sophistication, with about 77% of web attacks starting from botnets. With the increasing volume of cyberattacks, it’s critical for organizations to ensure accurate logs. Continue to this article to uncover the importance of logging and how F5’s Advanced WAF service can help.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

The Evolution of Zero Trust
sponsored by Banyan Security
WHITE PAPER: As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.
Posted: 03 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Easy Ways to Dominate the Securities-as-a-Service Game
sponsored by RapidFire
WHITE PAPER: Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

The Financial Adviser's Guide to Compliant IM and Collaboration
sponsored by Smarsh
WHITE PAPER: The rise of collaboration platforms and the compliance requirements they bring with them are a symptom of a larger reality: Workplace communications are changing. Read on to learn how you add IM and collaboration platforms to a compliant ecosystem in your organization.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

The Financial Adviser's Guide to Social Media Strategy and Policy
sponsored by Smarsh
WHITE PAPER: The U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA) recognize social media’s growing role in firms’ marketing strategies. In this guide, find practical steps to help you develop social media strategy and policy that meets social media recordkeeping and supervision regulatory requirements.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

Beginner's Guide to Employee Monitoring
sponsored by ActivTrak
WHITE PAPER: On the surface, employee monitoring systems might seem like a fancy way to babysit employees. However, this technology stands as a far more valuable tool than people give it credit for. In this white paper, learn about several security benefits of employee monitoring systems.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

ActivTrak

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Next-Gen Deception Technology: Moving Beyond Honeypots
sponsored by Illusive Networks
WHITE PAPER: As the market has evolved, three general types of deceptions have emerged; full interaction decoys (honeypots), partial or low interaction emulated decoys, and endpoint data deceptions. In this white paper, explore each type of deception and review the increasing complexity of deception technology.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Illusive Networks

Isolation: Separating Malware from the Network, Not Devices
sponsored by Menlo Security
WHITE PAPER: As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Menlo Security

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium

Quantifying the Point Solution Nightmare
sponsored by Tanium
WHITE PAPER: Forrester, in partnership with Tanium, conducted research into the current state of security and operations tools, teams, and trends to quantify the complexity of endpoint security management and integration. Read on to uncover the results and conclusions.
Posted: 22 Nov 2019 | Published: 31 May 2019

Tanium

Data Privacy Is the New Strategic Priority
sponsored by IBM
WHITE PAPER: Recently, Forrester conducted research, in partnership with IBM to evaluate enterprises’ data privacy compliance with increasing regulatory requirements. Read on to uncover the key insights from the research.
Posted: 22 Nov 2019 | Published: 31 Jul 2019

IBM

Core Principles of Cyber Hygiene in a World of Cloud and Mobility
sponsored by VMware
WHITE PAPER: Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news broadcast. In this white paper, learn how to address vulnerabilities before they become disastrous.
Posted: 22 Nov 2019 | Published: 15 Mar 2019

VMware

Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Lookout

The Top Automated Bot Threats and How to Stop Them
sponsored by Radware
WHITE PAPER: Global bot traffic is escalating and intensifying, and malicious bots can now mimic human behavior to scrape data, take over accounts and commit payment fraud. Staying ahead of these threats is important and thus requires security capabilities to detect and stop them. Learn more now.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Radware

Defining a Shared Responsibility Model for Amazon Web Services (AWS)
sponsored by Alert Logic
WHITE PAPER: In this e-book, discover a 5-step plan for using the AWS Shared Security Responsibility Model (SSRM) as a foundation for building a "cloud-first" cybersecurity defense plan.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Alert Logic

Sharpening the Edge: 5G Networks, Edge Computing, IoT and Their Implications on Cybersecurity for Service Providers
sponsored by Radware
WHITE PAPER: In this white paper, learn how to leverage automation and a new generation of software- and service-defined architectures to improve the digital experience for consumers and businesses alike, all the while providing a secure experience.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Radware

4 Ways to Improve Customer Experience with a Modern Identity Service
sponsored by Okta
WHITE PAPER: In order to unify the customer experience and drive engagement, there needs to be an identity layer serving as the connective tissue between apps, devices, channels, and experiences. In this white paper, learn how Okta’s modern identity services can help organizations improve their customer experience.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

Accelerating the Journey to Passwordless Authentication
sponsored by IBM
WHITE PAPER: A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.
Posted: 19 Nov 2019 | Published: 31 Jul 2019

IBM
1 - 25 of 778 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement