IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed   
Active Security Solutions Reports
 
The Business Case for Vulnerability Remediation Automation
sponsored by Vulcan
WHITE PAPER: Find out how your organization can reduce spending by investing in more efficient vulnerability remediation processes.
Posted: 18 May 2020 | Published: 18 May 2020

Vulcan

The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

The Ultimate Guide to: AWS, Azure, and GCP Cloud Asset Visibility
sponsored by Orca Security
WHITE PAPER: As organizations continue to embrace cloud migration, IT and security teams should reevaluate their current ability to view and analyze their cloud assets. The following guide explores current tactics and unveils a next-generation visibility and security tool designed to enable agentless visibility into AWS, Azure and GCP. Read on to learn more.
Posted: 11 May 2020 | Published: 11 May 2020

Orca Security

How to Combat Spear Phishing
sponsored by VMware International Unlimited Company
WHITE PAPER: Learn what spear phishing is, how it works, and find an example of how VMware Carbon Black’s cloud-native endpoint protection platform (EPP) constantly monitors and records what is happening on your endpoints—offering total visibility into malicious activities.
Posted: 11 May 2020 | Published: 11 May 2020

VMware International Unlimited Company

10 Endpoint Security Problems and How the Cloud Solves Them
sponsored by VMware International Unlimited Company
WHITE PAPER: In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.
Posted: 18 May 2020 | Published: 18 May 2020

VMware International Unlimited Company

2020 Cyberthreat Defense Report
sponsored by Gigamon
WHITE PAPER: The CyberEdge Group’s annual Cyberthreat Defense Report provides an insider look at the diverse threats plaguing organizations and the strategic approaches IT and security teams are taking to mitigate these threats. A snapshot of the key findings from this year’s report can be found in the following executive brief.
Posted: 14 May 2020 | Published: 14 May 2020

Gigamon

Smart Protection Complete
sponsored by Trend Micro
DATA SHEET: In this brief, learn about Trend Micro Smart Protection Complete, powered by XGen security, a connected suite of security capabilities that protects your users no matter where they go or what they do.
Posted: 20 May 2020 | Published: 20 May 2020

Trend Micro

Vulnerability Metrics - Which Matter and Which Don't
sponsored by Vulcan
RESOURCE: Metrics enable organizations to share information about cybersecurity risks and demonstrate vulnerabilities – but only if they’re the right metrics. So, how can you delineate between metrics of significance and those that can be ignored? Read on to find out.
Posted: 19 May 2020 | Published: 01 Nov 2018

Vulcan

Building a Successful Cloud Infrastructure Security & Compliance Practice
sponsored by CloudHealth by VMware
WHITE PAPER: In order to implement effective cloud security, various teams and stakeholders across the organization need to work together to overcome the emerging security and compliance challenges. This white paper provides a comprehensive set of guidelines for organizations to streamline their collaboration efforts. Read on to learn more.
Posted: 21 May 2020 | Published: 21 May 2020

CloudHealth by VMware

FilelessThreats 101
sponsored by Trend Micro
RESOURCE: This infographic provides a high-level overview of fileless threats: What they are, how they operate, where the vulnerabilities lie and how to protect against them. Download this infographic to and equip yourself with the knowledge to identify and prevent fileless attacks.
Posted: 21 May 2020 | Published: 21 May 2020

Trend Micro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info