IT Management  >   Systems Operations  >   Security  >  

Administration (Security)

RSS Feed   
Administration (Security) Reports
 
A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

7 Considerations for Implementing Zero Trust
sponsored by Banyan Security
RESOURCE: Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Banyan Security

BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

The Emergence of Unified Access Management
sponsored by OneLogin
EBRIEF: In a recent survey from 451 Research, 55% of respondents said security and compliance are what is stopping them from using a hosted IT infrastructure. Explore this business impact brief to see how unified access management can help alleviate these security concerns.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

OneLogin

The IT Director's Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: When it comes to managing cybersecurity, IT leaders & their teams are at a disadvantage: As threat methods are increasing in frequency & complexity, security teams must ensure protection with limited resources. Download this checklist as you develop your cybersecurity strategy & make effective use of existing resources.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Arctic Wolf Networks, Inc.

Insider Security Threats: What CISOs Can Do to Mitigate Them
sponsored by Preempt Security
EGUIDE: Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

Preempt Security

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

The Future of Identity and Access Management Tools
sponsored by Jumio
EGUIDE: Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

Enginess
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info