IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security Reports
 
Forcepoint Dynamic Data Protection
sponsored by Forcepoint
PRODUCT OVERVIEW: Learn how you can protect assets based on risk level of actors and the value of data by using endpoint and user behavioral analytics today.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Forcepoint

Ustgiving Turns to Onfido to Onboard More Customers, and for Seamless Integration
sponsored by Onfido
CASE STUDY: In this case study, learn how JustGiving, a leading social platform for charitable giving, was able to prevent fraudulent activity, increase its identity verification rates, and onboard users more quickly by using Onfido.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Onfido

Seamless Security Integration During a Merger or Acquisition Process
sponsored by Dell SecureWorks
WHITE PAPER: In addition to the challenges of brokering and completing a merger or acquisition, the logistics of integrating two or more businesses and closing potential risk gaps can be staggering. In this white paper, learn how a cybersecurity firm can deliver crucial expertise to facilitate a seamless integration of each company's cybersecurity program.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Dell SecureWorks

LogRhythm SOMM White Paper 2019
sponsored by LogRhythm, Inc.
WHITE PAPER: The traditional approach to the cybersecurity challenge has been prevention-centric. While this approach is necessary, organizations are increasingly shifting their focus to strategies centered on rapid threat detection and response. In this white paper, learn how LogRhythm can help organizations assess and improve their security operations.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

TOPICS: 
LogRhythm, Inc.

Why and How to Block Security Breaches at the Endpoint
sponsored by Freudenberg IT
WHITE PAPER: Most companies understand the need to defend the enterprise against malware, but some technologies can't provide sufficient protection. Organizations can put the right security tools in place and partner with an MSP to provide missing expertise and oversight. In this white paper, learn 7 best practices to consider when selecting an MSP.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Freudenberg IT

Security Operations Use Case Guide
sponsored by ServiceNow
CASE STUDY: ServiceNowReacting too slowly to a critical incident can have drastic consequences. In this guide, learn how you can benefit from the workflows and automation of this SOAR platform for faster security response.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
ServiceNow

Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

TOPICS: 
Arxan

Pillars of Protection: A New View of Enterprise Security
sponsored by Oracle Corporation
WHITE PAPER: Organizations today need to be protected at every layer – in the data center and in the cloud. Read on to learn how you can defend your business with the 3 pillars of protection.
Posted: 08 Feb 2019 | Published: 31 Jul 2018

TOPICS: 
Oracle Corporation

Pockit Integrates Onfido to Meet Their KYC & AML Requirements
sponsored by Onfido
CASE STUDY: Pockit, a privately owned bank, was faced with the challenge of onboarding customers and verifying their identity. Download this case study to learn how Onfido helped them meet their AML and KYC requirements along with quickly onboarding new customers.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Onfido

3 Keys to Managing Vendor Risk in Financial Services
sponsored by ServiceNow
WHITE PAPER: With near-daily security breaches, every business should have risk management at the top of its to-do list. Many financial institutions don't recognize the need to look beyond their own systems. The solution to this is a vendor risk management process that allows organizations to prioritize each vendor based on the risk they pose to the business.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement