Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices White Papers (View All Report Types)
1 - 25 of 877 Matches Previous Page  |  Next Page
The Key Pillars For Protecting Sensitive Data In Any Organization
sponsored by Thales
WHITE PAPER: Traditionally, companies have focused IT security primarily on perimeter defense. While this is important, it’s not enough. With today’s data scattered across networks, organizations need to apply a security strategy that protects data wherever it is. View this white paper to see the CipherTrust Data Security platform by Thales.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Thales

Security Starts Here AD: Account Lifecycle Management
sponsored by Quest
WHITE PAPER: Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Quest

Intelligent Security Solutions for Your Business
sponsored by Konica Minolta
WHITE PAPER: Many organizations don’t have the resources to keep a constant eye on their infrastructure to look out for potential weaknesses or threats. As such, they need to reevaluate their postures to secure the know-how to perpetually monitor their situation. Read this white paper to learn how make your security more intelligent.
Posted: 23 Oct 2020 | Published: 23 Oct 2020


The Total Economic Impact of Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.
Posted: 23 Oct 2020 | Published: 31 Aug 2020

Armor

How Secureworks Offers a Holistic Approach to Security
sponsored by Dell SecureWorks
WHITE PAPER: In today’s increasingly dangerous threat landscape, only a unified, integrated approach to security can help your organization address these challenges. This white paper talks about how SecureWorks leverages artificial intelligence and machine learning to help organizations build a holistic cybersecurity approach – read on to learn more.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Dell SecureWorks

5 Ways to Detect Application Security Vulnerabilities Earlier to Lower Cost and Risk using Azure DevOps
sponsored by Lunavi
WHITE PAPER: One of the most persistent problems with creating a secure environment for application development is that security measures often seem to be a step behind or come a moment too late. Read on to learn how, by integrating automated security validation into your continuous integration pipeline, you can finally achieve security that’s up to par.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Lunavi

The 2020 Spotlight Report on Office 365
sponsored by Vectra AI
WHITE PAPER: Account takeovers are responsible for upwards of $7 billion in annual losses across multiple industries, according to Forrester. The following Spotlight Report from Vectra provides a comprehensive analysis of the cyberthreats targeting Office 365 users, and why some of these attacks are succeeding – read on to learn more.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

Security for Modern Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

The New Economy
sponsored by Armor
WHITE PAPER: In this year’s Dark Market Report, Armor’s security team takes a closer look into the activities occurring in underground cybercrime communities, such as emerging threats, hacker price lists, trending attack vectors, and more – read on to explore the complete findings from the Armor security team.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

Armor

Critical Considerations for Securing Hybrid and Hyperscale Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Modern hybrid and hyperscale data center architectures must include security that can keep pace. But in many of these data center environments today, traditional network security solutions underperform and underserve, forcing compromises on either security or performance. Read this checklist to learn how you can work around this issue.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

Emergency Preparedness: Was Your Company Ready for COVID-19?
sponsored by VMware International Unlimited Company
WHITE PAPER: Emergency preparedness is tricky – it’s nearly impossible to plan for every emergency or incident. This research report from Osterman Research provides an in-depth analysis of emergency preparedness plans pre-COVID-19 and offers best practices for improving incident readiness going forward.
Posted: 22 Oct 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Key Considerations for Securing 5G Network Traffic
sponsored by Verizon
WHITE PAPER: The growth of enterprise data is putting pressure on technology professionals to secure and govern it. The generation, networking and storage of this data means that 5G will affect every company’s security posture. So, how can you be prepared for what’s coming? Read this white paper to learn how 5G security will be influenced by evolving threats.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Verizon

From Reactive to Proactive: Keys to Shifting Your Cybersecurity Strategy
sponsored by Dell SecureWorks
WHITE PAPER: A constant state of readiness is crucial when it comes to cybersecurity. Senior leaders who embrace this ethos stand a much better chance of minimizing the damages, risks, and costs than leaders who have no plan and respond to threats reactively. How do you take on this stance? Read this white paper to learn 4 keys to security proactivity.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

You’ve Been Compromised: Now What?
sponsored by Dell SecureWorks
WHITE PAPER: Smart cybersecurity operations require extensive preparation and planning. Without them, organizations run the risk of poorly coordinated incident response (IR) activities that could cause more damage than the compromise itself. So how do you respond the right way? Read this white paper to get the answer.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

Is Your Enterprise Network Future Ready?
sponsored by VMware
WHITE PAPER: To keep up with the rapid pace of their businesses, many organizations have adopted a multi-cloud strategy. However, complexity can add up quickly. In this white paper, learn how building a foundation of consistent networking and security across clouds can help simplify multi-cloud operations.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware

The Six Steps to Effective Cloud Governance
sponsored by Concourse Labs
WHITE PAPER: Without effective cloud governance, cloud migrations would present disastrous security risks – threatening an organizations financial health, regulatory compliance and reputation. This eBook provides 6 regimented steps to help organization achieve effective cloud governance.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Automated Cloud Governance: The ONUG Collaborative
sponsored by Concourse Labs
WHITE PAPER: As organizations continue to embrace cloud capabilities, ensuring security and governance across these new environments becomes more important than ever. This e-guide provides a comprehensive overview of the most effective way to achieve automated cloud governance (compliance & security at the speed of DevOps) – read on to get started.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches
sponsored by Dell SecureWorks
WHITE PAPER: A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Dell SecureWorks

How to Consolidate Your Cybersecurity Stack
sponsored by Dell SecureWorks
WHITE PAPER: As a result of rapid innovation by threat actors in the past decade, the number of layers in the average cybersecurity stack is now up to 47. This number wouldn’t seem so horrible if these tools worked well together, but they don’t. It may be time to consolidate your cybersecurity. Read this white paper to learn the framework for doing so.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Dell SecureWorks

Seven Strategies to Securely Enable Remote Workers
sponsored by BlackBerry
WHITE PAPER: Remote work is becoming a "must-have" job requirement, and security architectures and network protocols are changing as a result. New security methodologies, like zero trust, are being more heavily considered, and network professionals must work to ensure productivity from anywhere. Read this white paper to learn 7 strategies for remote enablement.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

BlackBerry

Managing Digital Risk: The Security Challenge Beyond Your Perimeter
sponsored by Mimecast
WHITE PAPER: Today’s security leaders are feeling the pressure that cyber risks presents to their organization’s reputation. But managing digital risk can sometimes be resource exhaustive. Read this Mimecast guide for an overview of modern challenges and how to overcome them.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Mimecast

Cloud Usage in the Financial Services Sector
sponsored by McAfee
WHITE PAPER: The following report, Cloud Usage in the Financial Services Sector, provides a closer look at the results of a Cloud Security Alliance survey designed to identify the challenges, risks and best practices for the development, deployment and management of secure cloud services in the financial services industry – read on to view the findings.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

McAfee

Tackling Cyber Threats in a Newly Distributed Workforce
sponsored by IntelliGO
WHITE PAPER: As organizations scramble to deal with the logistical kinks that come from hastily enabling a newly remote workforce, their IT teams must remain vigilant and flexible when it comes to securing tech assets amid changing circumstances. How can you make sure you’re staying on top of threats? Read this white paper to learn where to start.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

IntelliGO

The Clock is Always Ticking: 24/7 Cybersecurity Monitoring Takes its Toll
sponsored by Dell SecureWorks
WHITE PAPER: 65% of Security Operations Center (SOC) professionals say stress has caused them to think about quitting. Needless to say, security is stressful, but relief is possible. Read this white paper to explore the issue of increasing demands on security practitioners and to explore several avenues for automating and reducing workloads for team members.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Dell SecureWorks

Keeping Tabs on a Constantly Evolving Threat Landscape
sponsored by Dell SecureWorks
WHITE PAPER: Criminal threat actors aren’t just developing their tactics and techniques – they’re updating their ‘business’ strategies, too. Cybercriminal operators are adopting strategies often seen in the legitimate business world to increase return on investment (ROI) and operational efficiency. Jump into this white paper to learn more.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Dell SecureWorks
1 - 25 of 877 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info