IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed   
Computer Network Security Reports
 
Endpoint Protection & Device Management
sponsored by Seqrite
EGUIDE: The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
Posted: 30 Jan 2018 | Published: 24 Jan 2018

Seqrite

The Cost of Insecure Endpoints
sponsored by Absolute
ANALYST REPORT: According to the Ponemon Institute, just one failed endpoint can cost an organization an average of $612. Explore this Ponemon Institute report to gain insight into insecure endpoints and the excessive costs companies are spending after their endpoints are compromised.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Absolute

How Automated Security Workflows Help you Stay Above Water
sponsored by VMware
WHITE PAPER: Explore the changing nature of risk in the data center and how network virtualization enables automation of your security operations.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

VMware

Public Key Infrastructure (PKI) Buyer's Guide
sponsored by Entrust, Inc.
RESOURCE: Implementing cost-effective security strategies that meet operational needs of end-users while complying with regulatory requirements is challenging. This resource assists organizations in the selection of the best PKI strategy to meet business and security needs.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

A Next-Generation Approach to Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Vulnerability scanning is the focal point for most enterprise vulnerability management programs. This white paper uncovers a next-generation approach to vulnerability management and how it can improve the security gaps within networks.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

Automating Cloud Security to Mitigate Risk
sponsored by Skybox Security
WHITE PAPER: The cloud opens new ways for attackers to access your sensitive data. This paper explores the potential security challenges enterprises face as they migrate to any kind of cloud setup and offers guidance to ensure a smooth migration.
Posted: 06 Feb 2018 | Published: 31 Jul 2017

Skybox Security

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
RESOURCE: Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner report reveals strengths and cautions of different vendor's security information and event management products as well as a market overview.
Posted: 11 Dec 2017 | Published: 04 Dec 2017

LogRhythm, Inc.

Compromised User and Host Detection Using Behavioral Analytics
sponsored by Hewlett Packard Enterprise
RESOURCE: Allow this resource to teach you how network monitoring through multi-dimensional analytics enables the creation of high-fidelity entity risk profiles and shrinks the time to detect attacks.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Hewlett Packard Enterprise

The Benefits of Network Monitoring for Industrial Automation
sponsored by SecurityMatters
WHITE PAPER: Recently, there have been many cyberattacks occurring in the industrial automation world including the Mirai botnet, WannaCry, Non-Petya and more. This whitepaper reveals an approach to improving network security by assessing, detecting, responding, and preventing attacks.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

SecurityMatters

The Top 4 Myths of Network Security and Compliance
sponsored by FireMon
WHITE PAPER: Each year, fraudulent activity accounts for $600 billion in losses in the United States. Explore this resource to gain insight into policy regulations and how to secure your data while maintaining regulatory compliance.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

FireMon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement