IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
The Evolution of Mobile Security
sponsored by Symantec
WHITE PAPER: Given that emails containing sensitive information are routinely opened on a mobile device, implementing robust security controls on these devices should be a top priority. In this white paper, learn how to break down the barriers that separate mobile security from traditional security to ensure your organization has a seamless security ecosystem.
Posted: 08 May 2019 | Published: 08 May 2019

Symantec

Security Automation with Ansible
sponsored by Red Hat
WEBCAST: Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.
Posted: 15 May 2019 | Premiered: May 15, 2019

Red Hat

Naked Data
sponsored by Armor
WHITE PAPER: There have been many examples where organizations exposed files including sensitive consumer data. The exposures raised the specter of the cloud having no tolerance for innocent mistakes. However, cloud security posture management tools can help you avoid being another example of what can go wrong. Download this white paper to learn how.
Posted: 29 Apr 2019 | Published: 30 Apr 2019

Armor

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

Hybrid Cloud Company Armors its Defenses
sponsored by Armor
CASE STUDY: In today's business environment, security must be an integral consideration for all organizations. With that in mind, a large technology service provider wanted to ensure that its infrastructure was properly secured. In this case study, explore why the service provider chose to implement Armor Anywhere, Armor's cloud-based security-as-a-service.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Armor

Safeguard your devices against ransomware with Log360
sponsored by ManageEngine
WHITE PAPER: Network attack mechanisms continue to evolve on a daily basis. Of the network attacks that aim to steal or compromise data in some way, ransomware attacks have gained significance in recent times. In this white paper, learn how to properly implement and utilize SIEM as a defense against ransomware.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

Case Study: New York Cruise Lines & Armor Cloud Security
sponsored by Armor
CASE STUDY: The New York Cruise Lines wanted to ensure they provided guests with online resources. However, with every new web-facing resource, there's an increased risk of a data breach. In this case study, learn how the New York Cruise Lines were able to secure their hybrid cloud infrastructure by implementing Armor's managed security provider.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Armor

2018 Threat Report
sponsored by CenturyLink
WHITE PAPER: As cyberthreats proliferate, organizations often seek to find the silver bullet for cybersecurity issues. With so many differing viewpoints of the threat landscape, identifying actionable intelligence is difficult. In this threat report, explore key insights on what the CenturyLink Threat Research Labs sees across the CenturyLink global backbone.
Posted: 01 May 2019 | Published: 01 May 2019

CenturyLink

Cloud Security: Top Threats and Key Defenses
sponsored by TierPoint
WHITE PAPER: Download this white paper for the top threats in cloud security and how a cloud-based security service provider can help you defend against them.
Posted: 22 May 2019 | Published: 22 May 2019

TierPoint

Complete and Differentiated Managed Endpoint Detection and Response Services with Ensilo
sponsored by enSilo
RESOURCE: The market for managed endpoint security services is both changing and growing. Providers are moving beyond traditional managed security services and offering services that protect against advanced threats. In this resource, learn how with enSilo, MSSPs can provide more effective and faster security.
Posted: 23 May 2019 | Published: 23 May 2019

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement