IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed   
Computer Security Management Reports
 
Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

The Basics of Auditing and Securing Your Network Perimeter with SIEM
sponsored by ManageEngine
WHITE PAPER: To thwart network attacks, you first need to be on top of critical security events occurring in your network. But due to the high volume of events, auditing these events in real time can be challenging, if not impossible. In this white paper, learn about the basics of auditing and securing your network perimeter by leveraging SIEM.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT: Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.
Posted: 08 May 2019 | Published: 08 May 2019

Proofpoint

Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security
sponsored by Proofpoint
CASE STUDY: From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

Secureworks Red Cloak Threat Detection and Response Application
sponsored by Dell SecureWorks
RESEARCH CONTENT: Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, and compromise IT assets. This is where threat detection and response come into play. The tools used for these tasks are referred to as security analytics and operations. In this research report, explore the state of the security analytics and operations market.
Posted: 21 May 2019 | Published: 31 May 2019

Dell SecureWorks

F5 Advanced WAF
sponsored by F5 Networks
PRODUCT OVERVIEW: Attackers have embraced the use of automation to scan applications for vulnerabilities, attack account credentials, or cause denial of service (DoS). However, web application firewalls (WAF) can protect your applications from data breaches. In this resource, learn how F5 Advanced WAF can help you defend against attacks.
Posted: 07 May 2019 | Published: 07 May 2019

F5 Networks

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT: Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018

Forcepoint

Podcast: Privileged Account Governance and Incident Response
sponsored by One Identity
PODCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

Aeris and ROAMWORKS: Protecting Cargo from Security Challenges
sponsored by Aeris
CASE STUDY: To assist Dubai Airports achieve its goals, ROAMWORKS, with the help of Aeris, provided an end-to-end platform that enabled airport management to monitor, track, manage, and control their asset data around the world. In this case study, learn more about ROAMWORKS and Aeris' partnership and how they can help protect cargo from security challenges.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Aeris
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement