IT Management  >   Systems Operations  >  

Systems Security

RSS Feed   
Systems Security White Papers (View All Report Types)
 
5 Key Steps to Securely Connect your Remote Workforce
sponsored by Intrado
WHITE PAPER: The overnight shift from on-site to remote work environments has led to a mass adoption of video collaboration tools and applications. However, many companies took a “connectivity first” approach, exposing their organization to a host of new security risks. Stay safe – read these 5 steps to securely connecting your remote workforce.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

Intrado

Why Hackers Hack
sponsored by Carbonite
WHITE PAPER: This white paper breaks down some of the most common hacker myths and unveils the true methods and motivations behind these myths to help your organization lock down and protect customers against today’s biggest threats. Download to read more.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Carbonite

How Secure is Your Cloud Data?
sponsored by Webroot/Carbonite
WHITE PAPER: Confusion in the cloud puts businesses at a higher risk for data loss as they rapidly shift operations to SaaS environments. Because SaaS providers are only responsible for availability, not customer data, it’s important that businesses are prepared for data loss scenarios. View this case study to learn how to protect your portfolio.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Webroot/Carbonite

Carbonite Data Protection & Cyber Resilience
sponsored by Webroot/Carbonite
WHITE PAPER: Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data. Access this white paper to learn how to reliably protect data and stay cyber-resilient during adverse events.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Webroot/Carbonite

The Practical Executive'S Guide To Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: Download the whitepaper for information on successfully deploying DLP, including latest data breach trends, assessing DLP vendors, 9-step framework, and best practices to ensure success.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

TOPICS:  Security
Forcepoint

5 Powerful Solutions for Scaling Application Security
sponsored by ZeroNorth
WHITE PAPER: Inside this State of Application Security report, find the most up-to-date findings, discover the 5 most powerful solutions for scaling application security, and explore how the infamously rocky relationship between development and security managed throughout 2020. Download the report here.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ZeroNorth

Kaspersky for Security Operations Center
sponsored by Kaspersky
WHITE PAPER: Many organizations are establishing Security Operations Centers (SOCs) to combat security issues as they arise, providing a swift response and a decisive resolution.In this white paper, learn about Kaspersky’s Security Training Program as well as their other advanced offerings that can help make your SOCs and security teams the best they can be.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

TOPICS:  Security
Kaspersky

Best Practices DNS: The First Principle of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Infoblox

Adopting a Strategic Mindset for Cloud-Native Application Protection
sponsored by AWS Checkpoint
WHITE PAPER: As cloud-native applications become more and more of the norm, it’s not just developers who need to keep up. Security teams must adopt a strategic mindset for cloud-native application protection—one that prioritizes threat visibility, automation, and container security. Learn how to adopt the right security-forward mindset in this guide.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
AWS Checkpoint

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info