Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Corporate Security Spending

RSS Feed   
Corporate Security Spending Reports
 
Complexity in Cybersecurity Report
sponsored by IBM
ANALYST REPORT: Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats. Fill out this form to read more about it.
Posted: 07 Aug 2020 | Published: 31 May 2019

IBM

Empower Security Analysts Through Guided EDR Investigation
sponsored by McAfee
WHITE PAPER: Today’s EDR solutions are often better tailored to larger enterprises – leaving most security teams feeling overwhelmed and at risk. This Forrester report takes a closer look at an emerging EDR trend – guided investigation – which leverages automation to enable greater security, efficiency and scale. Read on to see what Forrester has to say.
Posted: 10 Aug 2020 | Published: 31 May 2019

McAfee

Identity & Access Management from IBM
sponsored by IBM
RESOURCE: Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

The Road to Digital Transformation: Enabling OT-IT Convergence
sponsored by Orange Business Services
WHITE PAPER: This IDC InfoBrief, The Road to Digital Transformation: Enabling OT-IT Convergence, provides an in-depth look at the obstacles and opportunities as they relate to embracing digital transformation through operational technology (OT) and information technology (IT) convergence. Read on to leverage IDC’s expert guidance.
Posted: 22 Jul 2020 | Published: 31 May 2020

Orange Business Services

Global Cyber Security Metrics Report
sponsored by Thycotic
EGUIDE: For CISOs, the increased cybersecurity pressure (both internal and external) is causing significant stress and burnout – the average CISO lasts roughly 18 months in the role. To help security leaders avoid this burden, Thycotic created this report, which offers guidance and best practices to achieve success and reduce stress.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Thycotic

SailPoint Identity Hub: Search, Track & Manage Access
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Cloud Access Security Brokers: Top Vendors & Offerings
sponsored by McAfee
RESOURCE: The popularity of Cloud Access Security Brokers (CASBs) as an effective measure for cloud data protection is on the rise. In order to help you select the right vendor for your unique needs, Gartner conducted a comprehensive analysis of the top CASB vendors and offerings in today’s market – read on to unlock the Magic Quadrant report.
Posted: 11 Aug 2020 | Published: 05 Nov 2019

McAfee

Cyberattack Trends: 2020 Mid-Year Report
sponsored by Checkpoint Software Technologies
ANALYST REPORT: If your organization has come under attack since the outbreak of COVID-19, you are not alone. Cyberthreats are becoming more prominent than ever as a result of the spike in remote work, and if you’re not aware of which threats are lurking, another attack may be on the horizon. Read this report to get an understanding of what to look out for.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Checkpoint Software Technologies

DDoS Attacks are Growing in Frequency and Scale During the Pandemic. What Can Businesses Do?
sponsored by Akamai Technologies
RESOURCE: Remote work means DDoS attacks loom larger than ever. On June 25, 2020, a European bank was hit with an attack that generated 809 million packets per second. The velocity and volume of these attacks can be overwhelming, but the right strategy can keep your network safe. Read this article to learn 6 considerations for mitigating DDoS attacks.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Akamai Technologies

Everyone as a Trusted Insider
sponsored by Dtex
PRODUCT OVERVIEW: Insider threats are on the rise, and traditional monitoring is too reactionary to handle today’s sophisticated attack methods. In this report, take a closer look at Dtex’s replacement to traditional employee monitoring – designed to promote employee privacy, proactive threat prevention, behavioral understanding of threats, and more.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Dtex
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info