IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed   
Security Network White Papers (View All Report Types)
 
ExtremeCloud™ IQ: Cloud Security and Architecture Overview
sponsored by Extreme Networks
WHITE PAPER: If you’re searching for a cloud-based network management and security solution that strives to provide centralized configuration, orchestration and network monitoring, reporting, alarms and statistics for all cloud-enabled devices, read this comprehensive white paper.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Extreme Networks

Deliver Business-Critical Communications with Enterprise Grade Private LTE
sponsored by Motorola, Inc.
WHITE PAPER: To address the shortcomings of Wi-Fi, the U.S. Federal Communications Commission (FCC) has approved the use of a new type of radio spectrum– Citizens Broadband Radio Service (CBRS). Download this white paper to learn more about CBRS and Motorola's Nitro platform which is powered by CBRS.
Posted: 15 Oct 2020 | Published: 09 Oct 2020

Motorola, Inc.

Rethink Firewalls: The Compelling Economic Case for Software-Based Segmentation
sponsored by Guardicore
WHITE PAPER: Why are IT and security teams still relying on legacy firewalls to do internal network segmentation? As policy-protected applications and segments proliferate, physical firewall appliances are proving ineffective in today’s increasingly dynamic hybrid-cloud environments. Read this white paper to learn about software-based segmentation.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Guardicore

How to Consolidate Your Cybersecurity Stack
sponsored by Dell SecureWorks
WHITE PAPER: As a result of rapid innovation by threat actors in the past decade, the number of layers in the average cybersecurity stack is now up to 47. This number wouldn’t seem so horrible if these tools worked well together, but they don’t. It may be time to consolidate your cybersecurity. Read this white paper to learn the framework for doing so.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Dell SecureWorks

Exploiting a Pandemic: Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER: COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Zero Trust eXtended Ecosystem Platform Providers
sponsored by Ionic Security
WHITE PAPER: This Forrester Wave Report evaluates the top vendors and offerings within the Zero Trust platform market – read on to unlock the vendor comparison matrix, scoring criteria and an in-depth analysis of each of the 15 most significant Zero Trust platform providers.
Posted: 06 Oct 2020 | Published: 24 Sep 2020

Ionic Security

Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: A 24/7 SOC identifies, investigates and resolves threats that target infrastructure, sensitive data, and ongoing business operations. But building a SOC can be time-consuming, complex and expensive, which is why organizations are turning to SOC-as-a-Service (SOCaaS). Read this guide to learn tips for preparing an RFP for a SOCaaS provider.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Cysiv

EMA Evaluation Guide to Privileged Access Management (PAM)
sponsored by Remediant
WHITE PAPER: Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Remediant
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info