Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocker Programs

RSS Feed   
Ad Blocker Programs Reports
 
ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups
sponsored by Cornerstone OnDemand
WEBCAST: In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Cornerstone OnDemand

Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

Cortex XSOAR
sponsored by Palo Alto Networks
DATA SHEET: Security teams are often overburdened with a growing volume of threats and security alerts that require manual attention. Download this data sheet for an in-depth look at Cortex XSOAR, a security platform designed to streamline security operation center (SOC) efficiency by empowering teams with enhanced automation and collaboration capabilities.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Palo Alto Networks

Securing a Remote Workforce
sponsored by ProAct
WEBCAST: As people connect to their work VPNs via their home networks, there are more holes in security and greater vulnerability to attack. According to Barracuda Networks, email phishing went up 600% in the month of March. Watch this webinar for an in-depth look at cyberthreats – and what you can do to fight back.
Posted: 25 Jun 2020 | Premiered: Apr 8, 2020

ProAct

How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
WEBCAST: While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Okta

The State of Cyber Security in the Legal Sector
sponsored by BlueVoyant
WHITE PAPER: Law firms are a critical industry that possess high-value information, making them a lucrative target for cybercriminals. The following report provides a comprehensive analysis of the state of cybersecurity and cyberthreats in the legal sector. Read on to unlock the results.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

BlueVoyant

Cortex XDR Endpoint Protection Solution Guide
sponsored by Palo Alto Networks
PRODUCT OVERVIEW: To protect your endpoints against the threats used by today’s cyberattackers, prevention tactics and AI-based analysis tools are needed to simplify operations and outpace hackers. Download this solution guide for a closer look at Cortex EDR, a cloud-delivered agent designed to help with endpoint detection, protection and response.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Palo Alto Networks

Birst Security and Reliability
sponsored by Infor
WHITE PAPER: The following white paper provides an in-depth look at the key security capabilities of Birst, an Infor company. Download this white paper to learn how Birst ensure the protection and privacy of their customers data and discover how they maintain high data security standards.
Posted: 01 Jul 2020 | Published: 01 Jul 2020


Hot Topic Live Okta Guy Mason
sponsored by Okta
WEBCAST: In this episode of Hot Topics Live, join the CIO of Bourne Leisure, a major player in the UK holiday and hospitality industry, as they discuss how the organization dealt with the pandemic and its ensuing lockdown.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Okta

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info