IT Management  >   Systems Operations  >  

Systems Security

RSS Feed   
Systems Security White Papers (View All Report Types)
 
Decoupling Security from the Network: The Evolution of Segmentation
sponsored by Illumio
WHITE PAPER: Segmentation has been around as long as we've been connecting networks. But networks are about connecting things with utility-like reliability – whereas segmentation is about reliably isolating things. Download this white paper to learn about decupling security from the network.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Illumio

Meeting the Challenge of Cloud-Native Security Threats
sponsored by Amazon Web Services
WHITE PAPER: Learn how your network and security operations teams can gain real-time situational awareness of all users, devices, and traffic on the network, in the data center and across your AWS environment, so you can quickly and effectively respond to threats.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Amazon Web Services

How the Gigamon Insight Solution Can Help Secure Medical Devices
sponsored by Gigamon
WHITE PAPER: As the number of medical devices being used in HDOs' networks increase, so too does the number of targets for threat actors. In this white paper, learn about a passive network security monitoring solution and how it cover the existing medical devices in an HDO's network, but also any new devices that are placed onto the network.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

The 5 New Rules to Secure Dynamic Data Center and Clouds
sponsored by Illumio
WHITE PAPER: In this white paper, learn about a different approach to security—one that is adaptive, protects from the inside out, and decouples security from the underlying infrastructure.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Illumio

How To Achieve And Maintain Compliance For Your Organization's Electronic Communications Data
sponsored by Smarsh
WHITE PAPER: When it comes to the rapid adoption of modern communication and collaboration tools, it's imperative organizations get ahead of capturing and archiving significant volumes of data. In this white paper, learn how to address common compliance challenges that are associated with electronic communications data.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Smarsh

Executive Report: Phishing by the Numbers
sponsored by Inky Technology
WHITE PAPER: View this report that breaks down some of the critical phishing attack statistics for the past year and reveals the 7 most common phishing themes to watch out for in 2020.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Inky Technology

5 Best Practices in Cloud Security for Legal
sponsored by ShieldX
WHITE PAPER: Everyone is moving to the cloud. But unfortunately, cloud adoption is moving too fast for security to keep up. This e-book outlines a series of best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud. Read on for 5 best practices these customers have shared.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ShieldX

Securing the Web Perimeter
sponsored by Cloudflare
WHITE PAPER: In this white paper, learn how WordPress, VPNs, outdated TLS, and web apps built with modern stacks can increase the risk of security breaches and how to reduce that risk.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Cloudflare

Cloud Security Gaps
sponsored by Aporeto
WHITE PAPER: In this white paper, learn about application segmentation that’s based on application identity, where you can effectively segment workloads and securely build and run applications in the Zero Trust landscape of the public cloud.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

GreyEnergy: Dissecting the Malware from Maldoc to Backdoor
sponsored by Nozomi Networks
WHITE PAPER: GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.
Posted: 26 Sep 2019 | Published: 28 Feb 2019

Nozomi Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement