IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security Reports
2018 Endpoint Security Report
sponsored by Tanium
RESEARCH CONTENT: According to the PwC Global State of Information Security Survey, many companies vulnerable to cyberattacks remain unprepared to deal with digital intrusions. Inside, find the results of an endpoint security research report to uncover what organizations think of the challenges regarding incident response, investigation and remediation on endpoints.
Posted: 15 Feb 2018 | Published: 15 Feb 2018


Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive
sponsored by Splunk
VIDEO: This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards.
Posted: 15 Feb 2018 | Premiered: 05 Dec 2017


Automation and Analytics versus the Chaos of Cybersecurity Operations
sponsored by McAfee, Inc.
RESEARCH CONTENT: Learn what high performing security organizations are doing to make measurable improvements in their cybersecurity analytics and operations architecture.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

McAfee, Inc.

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
WHITE PAPER: From 2016-2017, nearly 1 million U.S. businesses fell victim to ransomware, resulting in an estimated 11 million hours of downtime, according to Datto. This e-book offers an essential cybersecurity guide for SMBs.
Posted: 23 Feb 2018 | Published: 23 Feb 2018

Datto, Inc.

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

Are You Protected Against Burst Attacks?
sponsored by Radware
RESOURCE: In this resource, get a step-by-step breakdown of burst attack detection and prevention, then learn why a system that combines on-premise and in-the-cloud protection is the best way to defend against burst attacks.
Posted: 06 Mar 2018 | Published: 15 Feb 2018


Magnify Traffic Visibility for Security in VMware Networks
sponsored by APCON, Inc.
RESOURCE: Learn how to coordinate and architect network traffic monitoring in a VMware environment to improve security.
Posted: 12 Mar 2018 | Published: 29 Dec 2017


The Future of Security Operations
sponsored by IBM Resilient
RESOURCE: As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

IBM Resilient

Why Many Cloud Communications Providers Don't Like to Talk About Security, Compliance and Reliability
sponsored by 8x8, Inc.
WHITE PAPER: Learn how security, compliance and reliability are just as important for business communication systems and 10 tough questions you should ask your communications provider today.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

8x8, Inc.

Mobile security moving to a unified approach
sponsored by
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement