IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed   
Application Security Threats Reports
 
Endpoint Protection Buyer Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

CrowdStrike

Market Guide for Cloud Workload Protection Platforms: Assessment
sponsored by Trend Micro, Inc.
RESOURCE: With the rise of cloud adoption, there is a fast-moving shift from traditional signature-based end-user security to a much more tactful and strategic approach to protecting cloud servers and workloads. In this resource, explore 5 buyer recommendations to address security and compliance risks inherent in public cloud environments.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Trend Micro, Inc.

Addressing Security Challenges in Hybrid Cloud Environments
sponsored by Trend Micro, Inc.
WHITE PAPER: Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 04 Apr 2019 | Published: 04 Apr 2019

Trend Micro, Inc.

How long does it take to get owned?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
sponsored by Rapid7
WHITE PAPER: The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

Email Security Risk Assessment
sponsored by Mimecast
RESEARCH CONTENT: Many email security systems today fall short and do not keep their organizations safe. In fact, the proof is in the numbers. Download the Email Security Risk Assessment to see how Mimecast discovered the number and type of unwanted and dangerous emails missed by incumbent email security systems.
Posted: 12 Apr 2019 | Published: 12 Apr 2019

Mimecast

Identity and Data Management: The Strategic Imperative
sponsored by Optiv
WHITE PAPER: In the era of digital transformation, identity and data management (IDM) is essential to strategic security programs to protect and control continuously shifting assets needed in business enablement initiatives. In this white paper, explore key elements that Optiv recommends organizations include in their strategic IDM program.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Optiv

Redefining Security Orchestration, Automation & Response with the MITRE ATT&CK Framework
sponsored by D3 Security
WHITE PAPER: SOAR platforms are broadly effective at the linear process of in-taking events and orchestrating response actions. However, they vary in their ability to support larger investigations that identify the scope of an incident. In this white paper, learn more about SOAR platforms including key differences between event-based and intent-based response.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

D3 Security

The SOAR Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Investing in a SOAR platform is a wise and highly strategic decision. After all, choosing the platform to build your SOC on is arguably more important than choosing any point security product. This white paper aims to outline the important criteria you should consider when evaluating SOAR platforms.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Splunk Services UK Ltd
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement