IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed   
Active Security Solutions Reports
 
DPI and Cloud Computing Security Platforms for the IoT Era
sponsored by ADLINK Technology
WHITE PAPER: As IoT continues to grow, the security of networks is at risk. This resource offers strategies for securing network devices used in PDI for cloud computing security as well as an approach to integrating hardware and software to address new security requirements of the IoT era.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

ADLINK Technology

Economic, Operational & Strategic Benefits of Security Framework Adoption
sponsored by Tenable, Inc.
EBOOK: What are the business and security benefits that come from adopting a security framework? In this 96-page e-book, 38 information security leaders share success perspectives and lessons learned regarding their security framework.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Tenable, Inc.

Deception Technology Comes of Age
sponsored by Illusive Networks
WHITE PAPER: Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Illusive Networks

Modern IAM: Build Trust Without Sacrificing Security
sponsored by CA Technologies
WHITE PAPER: This white paper outlines how a modern identity and access management system can help build trust between yourself and your users without infringing on their freedom.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

CA Technologies

Why all Companies Should Require Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: In this white paper, learn why your organization should adopt a digital risk management strategy to mitigate corporate risk and the first 2 steps to getting started.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

Why HIPAA Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: In this white paper, gain valuable insights into automating privileged account management and streamlining compliance to meet HIPAA's requirements.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

The Rebirth of Endpoint Protection
sponsored by NSS Labs
WHITE PAPER: Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs

Freedom Security Alliance Dramatically Accelerates Security Response Services
sponsored by ServiceNow
CASE STUDY: Explore this case study to gain insight into how Freedom Security Alliance (FSA) improved their cybersecurity strategy by accelerating security response services.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

5 Overlooked Windows 10 Security Risks
sponsored by VMware
EGUIDE: Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement