IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed   
Computer Security Management Reports
 
How to Protect your Next-gen Extranet with a Software-defined Security Fabric
sponsored by Big Switch Networks
CASE STUDY: Fortune 20 Energy and Petroleum Company wanted to update its current extranet to better integrate new cybersecurity technologies and provide more monitoring capabilities, with a flexible network design. This case study explores how they leveraged a next-generation software-defined security fabric to do so.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Big Switch Networks

Aqua 2.0 Secrets Management for Containers
sponsored by Aqua Security
WEBCAST: Digitization and containerized environments have made secret management much more complicated than it ever was before. Watch this clip on a secret management solution that will seamlessly integrate into your containers from the Hashicorp vault.
Posted: 08 Mar 2018 | Premiered: Jul 27, 2017

Aqua Security

A WhiteHat Sentinel Product Family Overview
sponsored by WhiteHat Security
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

WhiteHat Security

The Five Milestones to GDPR Success
sponsored by Citrix
RESEARCH CONTENT: This Forrester Research Report details how to achieve 5 key milestones to have GDPR success by the May 2018 deadline.
Posted: 30 Jan 2018 | Published: 25 Apr 2017

Citrix

Mobile security moving to a unified approach
sponsored by ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

ComputerWeekly.com

Mobile security trends point to unifying policy and tools
sponsored by SearchSecurity.com
EBOOK: Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

SearchSecurity.com

How to Design and Maintain a Secure ICS Network
sponsored by SecurityMatters
WHITE PAPER: Learn about the IEC 62443 standards and their limitations so that you can reduce the exposure of industrial networks to constantly evolving threats with analytics, network segmentation, enhanced threat detection, and more.
Posted: 12 Feb 2018 | Published: 16 Jul 2015

SecurityMatters

Contractor Cyber Risk Continues to Grow
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Access this resource to learn 3 strategies to mitigate risk when hiring an outside contractor for your networking needs.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast, Enza Iannopollo, security & risk analyst at Forrester Research, demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates

Ransomware Protection: Five Best Practices
sponsored by Absolute
ANALYST REPORT: Security and risk professionals need to develop and implement the proper controls to slow and prevent the ransomware spread. In this Forrester Research Report, reveal the 5 best practices for ransomware protection.
Posted: 30 Jan 2018 | Published: 27 Jul 2017

Absolute
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement