Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices White Papers (View All Report Types)
51 - 75 of 677 Matches Previous Page  |  Next Page
Isolation: Separating Malware from the Network, Not Devices
sponsored by Menlo Security
WHITE PAPER: As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Menlo Security

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium

Quantifying the Point Solution Nightmare
sponsored by Tanium
WHITE PAPER: Forrester, in partnership with Tanium, conducted research into the current state of security and operations tools, teams, and trends to quantify the complexity of endpoint security management and integration. Read on to uncover the results and conclusions.
Posted: 22 Nov 2019 | Published: 31 May 2019

Tanium

Core Principles of Cyber Hygiene in a World of Cloud and Mobility
sponsored by VMware
WHITE PAPER: Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news broadcast. In this white paper, learn how to address vulnerabilities before they become disastrous.
Posted: 22 Nov 2019 | Published: 15 Mar 2019

VMware

Defining a Shared Responsibility Model for Amazon Web Services (AWS)
sponsored by Alert Logic
WHITE PAPER: In this e-book, discover a 5-step plan for using the AWS Shared Security Responsibility Model (SSRM) as a foundation for building a "cloud-first" cybersecurity defense plan.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Alert Logic

Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

Future-Proofing Your Information Security Strategy
sponsored by InteliSecure
WHITE PAPER: In this guide, Jeremy Wittkop, Chief Technology Officer, explains why security leaders should start pivoting their security strategies to emphasize the 2 elements of security that are not likely to be diminished: people and data. Read on to learn more about what he thinks really matters in the future of security and what you can do about it now.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

InteliSecure

Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform
sponsored by enSilo
WHITE PAPER: With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.
Posted: 13 Nov 2019 | Published: 31 Mar 2018


Guide to Understanding Ransomware
sponsored by enSilo
WHITE PAPER: Ransomware is an increasingly popular tactic used to steal data and disrupt a system’s operations. In enSilo’s Guide to Understanding Ransomware, discover everything you need to know about protecting and defending against ransomware.
Posted: 13 Nov 2019 | Published: 13 Nov 2019


Protecting Data Capital in Your Organization
sponsored by Dell EMC
WHITE PAPER: With high volumes of business-critical data comes the necessity for innovative and modernized data protection strategies—read this white paper to learn how to keep your most valuable digital assets well protected and compliant.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Dell EMC

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

Endpoint Security Buyer’s Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Tanium

The Challenges of Trusted Access in a Cloud-First World
sponsored by Thales
WHITE PAPER: With over 1,050 participants, the 2019 Thales Access Management Index revealed common security trends, concerns and access management technologies around cloud adoption used by today’s organizations. Download the executive summary to uncover the key findings and takeaways towards secure access management.
Posted: 12 Nov 2019 | Published: 31 Jul 2019

Thales

How to Lock Down Git
sponsored by Perforce
WHITE PAPER: While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Perforce

Best practices for secure cloud migration
sponsored by Thales
WHITE PAPER: The Cloud Security Alliance (CSA) is an organization whose mission is to promote best practices & provide education for cloud security. Recently, the CSA released a guide that covered best practices, key considerations & use cases. Is your organization considering adoption of cloud services? Read on to enhance your understanding.
Posted: 11 Nov 2019 | Published: 30 Jun 2019

Thales

Protecting Data in The Cloud 2019 Thales Cloud Security Study
sponsored by Thales
WHITE PAPER: During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.
Posted: 11 Nov 2019 | Published: 31 Oct 2019

Thales

Security for Cloud and On-Premises Deployment
sponsored by Mendix
WHITE PAPER: In this whitepaper, take an in-depth look at the Mendix platform, specifically as it relates to security for cloud, private cloud & on-premises environments. Download this report & discover why businesses across multiple industries trust Mendix to oversee the protection of their mission-critical data.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Mendix

Organizations are failing to protect sensitive data in the cloud
sponsored by Thales
WHITE PAPER: This infographic highlights some of the key takeaways from the 2019 Thales Cloud Security Study. Continue reading to uncover research findings as they relate to the amount of data stored, the kind of data & the prevalence of encryption or other security measures.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Thales

Safeguard your Private Keys with AppViewX
sponsored by AppViewX
WHITE PAPER: When a private key is uncovered by malicious actors, valuable data is compromised through the impersonation of an enterprise’s servers. So, how should enterprises properly safeguard their private keys? Learn how your enterprise can essentially replace the vulnerable private key inventories.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Vormetric Data Security Platform Architecture
sponsored by Thales
WHITE PAPER: As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.
Posted: 06 Nov 2019 | Published: 31 Jul 2019

Thales

Certificate Lifecycle Management and Automation
sponsored by AppViewX
WHITE PAPER: Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

AppViewX

Executive Summary 2019 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Thales
51 - 75 of 677 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info