IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems White Papers (View All Report Types)
1 - 25 of 549 Matches Previous Page  |  Next Page
EDR: The Case for Automation and Simplification
sponsored by Kaspersky Lab
WHITE PAPER: Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Kaspersky Lab

Selecting Your Next-Generation Firewall Solution
sponsored by Fortinet, Inc.
WHITE PAPER: As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this white paper so that you may approach your CISO with a well-informed and compelling recommendation.
Posted: 06 Aug 2020 | Published: 06 May 2020

Fortinet, Inc.

The Cloud Governance Playbook 2020
sponsored by Rackspace
WHITE PAPER: The Cloud Governance Playbook 2020 provides readers with extensive guidance, best practices and recommendations as they relate to the modern barriers to cloud governance. Read on to leverage the expertise and findings from Rackspace & AWS’ research and ensure your organization is on track.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

Rackspace

McAfee MVISION Cloud Security: 360° Shared Responsibility Model
sponsored by Duo
WHITE PAPER: Shared responsibility models are a core pillar of any effective security and compliance strategy. However, despite awareness of the need, organizational adoption isn’t where it should be. Download this white paper for an in-depth look at the 360˚ Shared Responsibility Model, including a look at its core capabilities and adoption best-practices.
Posted: 06 Aug 2020 | Published: 06 Aug 2020


CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper
sponsored by Thales
WHITE PAPER: The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

Best Practices for Cloud Data Protection and Key Management
sponsored by Thales
WHITE PAPER: In the era of digital transformation and multi-cloud environments, ensuring the protecting of sensitive data is more important than ever. The following whitepaper highlights cloud data protection best practices, including an in-depth look into cloud native encryption and key management (BYOK, HYOK, RoT & more).
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

Peer Insights: Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

Identity Governance & Administration (IGA)
sponsored by SailPoint Technologies
WHITE PAPER: In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.
Posted: 04 Aug 2020 | Published: 30 Apr 2019

SailPoint Technologies

Privileged Access Management
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.
Posted: 04 Aug 2020 | Published: 07 May 2020

CyberArk Software, Inc

BlackBerry MITRE ATTACK APT29 Evaluation
sponsored by BlackBerry
WHITE PAPER: In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

BlackBerry

StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure
sponsored by Bitdefender
WHITE PAPER: This investigation report compiles Bitdefender’s key findings from the information they gathered on StrongPity, a threat group that renown for their government-sponsored population surveillance and intelligence attacks. Download the report to learn more about StrongPity’s motives, tactics and infrastructure.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Bitdefender

BitterAPT Revisited: The Untold Evolution of an Android Espionage Tool
sponsored by Bitdefender
WHITE PAPER: A malware threat group targeting Pakistani nationals, known as Bitter, became infamous in 2016. In 2019, their campaigns had expanded to other countries in South Asia, East Asia and the Middle East. So, how have their espionage and malware tactics changed over the years? Download this in-depth report to find out.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Bitdefender

Privileged Access Management Policy Template
sponsored by Thycotic
WHITE PAPER: In order to protect privileged accounts against misuse, organizations are establishing privileged access management (PAM) policies. The following guide highlights a 10-step process for customizing a PAM policy template, designed to help your team build a policy based around your unique security and compliance requirements.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Thycotic

Kingminer –a Crypto-Jacking Botnet Under the Scope
sponsored by Bitdefender
WHITE PAPER: Kingminer is a piece of crypto-jacking malware that has been around since early 2018. It is an infection that begins from an SQL server process and exploits configuration flaws to obtain access to said server and schedules malicious commands for execution. Read this white paper for a technical analysis and how to know if you’ve been compromised.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Bitdefender

Lookout Discovery: Chinese Surveillanceware
sponsored by Lookout
WHITE PAPER: The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

Don’t Just Educate: Create Cybersafe Behavior
sponsored by Mimecast
WHITE PAPER: Building a cyber-resilient culture involves more than a cut-and-paste security training program that ticks the compliance checklist. In this Forrester study, discover how applying proven behavioral science to SA&T programs can yield organization-wide cultural change and improve security at the people-level.
Posted: 23 Jul 2020 | Published: 30 Apr 2020

Mimecast

How to Detect The 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Onfido

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
WHITE PAPER: Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

The Road to Digital Transformation: Enabling OT-IT Convergence
sponsored by Orange Business Services
WHITE PAPER: This IDC InfoBrief, The Road to Digital Transformation: Enabling OT-IT Convergence, provides an in-depth look at the obstacles and opportunities as they relate to embracing digital transformation through operational technology (OT) and information technology (IT) convergence. Read on to leverage IDC’s expert guidance.
Posted: 22 Jul 2020 | Published: 31 May 2020

Orange Business Services

Threat Intelligence Report: RSA Conference Edition 2020
sponsored by Mimecast
WHITE PAPER: The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Frost & Sullivan Best Practices Award
sponsored by Onfido
WHITE PAPER: The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Onfido

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

The Business Case for Cysiv SOC-as-a-Service
sponsored by Cysiv
WHITE PAPER: Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Cysiv

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
WHITE PAPER: Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.
Posted: 17 Jul 2020 | Published: 22 Apr 2020

Cysiv

5 steps to secure the enterprise and be fit for a flexible future
sponsored by Avanade
WHITE PAPER: From drastic shifts in remote capabilities to exacerbated security risks, COVID-19 has completely changed the cybersecurity landscape. The most effective way to approach securing your enterprise in the ‘new normal’ is to rethink cybersecurity strategies and challenges. Download this Avanade strategy guide to help guide your restructuring.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Avanade
1 - 25 of 549 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info