IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed   
Security Information and Event Management White Papers (View All Report Types)
 
Zero-Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER: The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Armis

Distance Learning’s Impact on Education IT
sponsored by Absolute Software Corporation
WHITE PAPER: The spread of COVID-19 has brought about a rapid and dramatic shift towards remote learning models in order to facilitate classroom effectiveness at K-12 schools. This report provides an overview of these challenges, risks and opportunities – gathered from a recent study into the impact of COVID-19 and remote learning on education IT.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Absolute Software Corporation

Smarter Data Protection with Machine Learning
sponsored by HelpSystems
WHITE PAPER: As data grows in its volume and value, organizations should ensure their data privacy capabilities are poised to address today’s cyberthreats and compliance requirements. Read this white paper and discover how machine learning and artificial intelligence can enhance data security programs.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

HelpSystems

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

How the Security Inversion Impacts User and Data Protection
sponsored by Netskope
WHITE PAPER: Legacy cybersecurity methods are becoming increasingly inefficient against today’s cyberthreats. Modernizing the security model is necessary to ensure innovation and the protection of data and users. Read this white paper to learn more about ensuring effective security in a cloud and mobile-first world.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Netskope

Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

Customer Identity and Access Management – The Master Key for Digital Markets
sponsored by IC Consult
WHITE PAPER: In today’s global market, everything centers on interfaces to customers: Who is the customer? How can their identity be confirmed reliably? Customer identity and access management (CIAM) is helping business answer these questions and more. In this white paper, examine the prerequisites, challenges and opportunities associated with CIAM.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

IC Consult

Security Starts Here AD: Account Lifecycle Management
sponsored by Quest
WHITE PAPER: Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Quest

SASE and the Forces Shaping Digital Transformation Part 2: Organizational Culture & Adversaries and Threats
sponsored by Netskope
WHITE PAPER: Amid digital transformation, an industry-wide focus on SASE and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. Read this in-depth blog to understand the forces of organizational culture, as well as adversaries and threats, on SASE initiatives.
Posted: 08 Jan 2021 | Published: 12 Nov 2020

Netskope

Spear Phishing: Top 3 Impersonation Attacks
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info