IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed   
Active Security Solutions Reports
 
Episode 3: The Compromise
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how unintentional insider behaviors can lead to credential compromise and wire transfer fraud.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Adopting Splunk's Analytics-Driven Security Platform as Your SIEM
sponsored by Splunk
WHITE PAPER: Read this white paper to learn why analytics integrated into a modern SIEM solution can turn your masses of machine data into unrivaled threat intelligence that catches attacks before they happen.
Posted: 03 Jun 2019 | Published: 31 Dec 2018

Splunk

Make Trusted Data Privacy Compliance Reporting Easy With ALTR Monitor
sponsored by ALTR
PRODUCT OVERVIEW: Data privacy has transformed from industry-specific regulations into broader compliance concerns which require transparency into the access and use of sensitive data. However, traditional database logs and monitoring products don't return complete information. In this solution brief, explore how ALTR Monitor provides a tamperproof record of data.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY: Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

How to Address the Top Five Human Threats to Your Data
sponsored by ALTR
WHITE PAPER: Data security threats seem to be everywhere and growing. Even the most hardened, off-the-grid security experts acknowledge that it is impossible to be 100% secure. Addressing top threats to your data is the first step in building a layered, data-centric approach to data security and privacy. Read on to learn how you can get started.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

ALTR

How Google Cloud Securely Enables Modern End-User Computing
sponsored by Google
RESOURCE: A multilayered security solution that works up and down the enterprise end user computing tech stack, could help your organization be more mobile and more productive, without sacrificing security. Download this blog post to learn more about the benefits of Google Cloud today.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

Google

Securing Office 365 Email with Isolation
sponsored by Menlo Security
EBOOK: An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Menlo Security

Explore Enterprise Network Firewalls
sponsored by Forcepoint
RESEARCH CONTENT: There are many options for Enterprise Network Firewalls, which all provide a variety of protection features. Although they all offer a standard set of features, there are often signification differences in each option. In this Gartner Magic Quadrant, explore the strengths and cautions of key vendors in the Enterprise Network Firewalls market.
Posted: 12 Jun 2019 | Published: 04 Oct 2018

Forcepoint

Compliance in the Cloud
sponsored by Lacework
WHITE PAPER: In this e-book, learn how automation and tooling can help scale compliance efforts and reduce control failures, why finding controls that work effectively in your specific CSP environment are critical (like authentication and vulnerability management), and more.
Posted: 30 May 2019 | Published: 30 May 2019

Lacework

Modernize Your Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. In this webcast, Angelica Torres-Corral, Senior Product Marketing Manager at Forcepoint gives insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) software and adopting a more proactive security strategy.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement