IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security Reports
2019 Financial Consumer Cybersecurity Threat Index
sponsored by Morphisec, Inc.
ANALYST REPORT: As Morphisec continues to assist financial providers with improving defenses and protecting consumer financial data and funds, they decided to examine how the increasing amount of financial cyberattacks are impacting the mindset of consumers. Download Morphisec's 2019 U.S. Consumer Financial Cybersecurity Threat Index to see what they found.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Morphisec, Inc.

How a Global Pharmaceutical Leader Boosted Security and Efficiency
sponsored by Cisco Umbrella
CASE STUDY: As Lundbeck, a global pharmaceutical leader expanded, so too did the need to manage its Cisco Cloud Web Security (CWS) solution. Download this case study to see how Lundbeck saw success with Cisco Umbrella.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

Insurer Prevents Losses from Fake Quotes
sponsored by Shape Security
CASE STUDY: A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Shape Security

How the Gigamon Insight Solution Can Help Secure Medical Devices
sponsored by Gigamon
WHITE PAPER: As the number of medical devices being used in HDOs' networks increase, so too does the number of targets for threat actors. In this white paper, learn about a passive network security monitoring solution and how it cover the existing medical devices in an HDO's network, but also any new devices that are placed onto the network.
Posted: 05 Sep 2019 | Published: 05 Sep 2019


Oklahoma Municipal Power Authority Energizes Team's Secure Remote Access with TAC
sponsored by PortSys
CASE STUDY: Technology inventions are being integrated across the energy sector with legacy hardware and software systems. However, the patches on these legacy systems can't keep up with today's threats. In this case study, learn how these challenges led to Oklahoma Municipal Power Authority deploying Total Access Control to help provide secure remote access.
Posted: 12 Sep 2019 | Published: 12 Sep 2019


How the Unity EdgeConnect SD-WAN Edge Platform Supports PCI DSS Compliance
sponsored by Silver Peak
WHITE PAPER: According to the latest Nilson Report, worldwide payment card fraud losses reached $24.3 B in 2018 and are expected to exceed $34 B by 2022. Read this white paper to learn how Silver Peak's SD-WAN can help keep you safe and comply with most PCI DSS requirements.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Silver Peak

Gaining Visibility into Risk and the ROI of Your Security Program
sponsored by Verizon
ANALYST REPORT: To make informed decisions about risk tolerance and security spending, it is critical to gain insight into the effectiveness of your security architecture, the threat landscape, and vulnerabilities. Download this IDC research report to explore how organizations can evaluate their security programs in the broader context of business risk.
Posted: 29 Aug 2019 | Published: 31 Oct 2018


Advanced Protection for Web Applications on AWS
sponsored by Amazon Web Services
WHITE PAPER: As companies migrate business-critical applications from their on-premises infrastructure to the cloud, they increase their exposure to known and unknown targeted attacks. In this white paper, learn how organizations can combat these threats by deploying a security solution designed specifically for internet-facing applications such as a WAF.
Posted: 04 Sep 2019 | Published: 21 Aug 2019

Amazon Web Services

Ulf Lindq Podcast
sponsored by Verodin
PODCAST: In this podcast episode, host Brian Contos and Dr. Ulf Lindqvist, the Senior Technical Director of SRI International's Computer Science Laboratory discuss the future of IoT devices, how the security industry has changed, and more. Tune in to learn more
Posted: 03 Sep 2019 | Premiered: Sep 3, 2019


You Need to See It to Protect It: How Real-Time Visibility and IT Hygiene Drive AWS EC2 Security
sponsored by Amazon Web Services
WHITE PAPER: Organizations are increasingly connecting mission-critical apps and data to AWS and taking advantage of its scalable Elastic Compute Cloud (EC2). But, managing and securing your own EC2 environment can become a challenge. In this white paper, learn how real-time visibility and good IT hygiene can drive AWS EC2 security.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Amazon Web Services

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement