IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed   
Device Security Policies Reports
 
The Future of Security and Compliance Starts Here
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

SailPoint Technologies

How to prepare for and survive a ransomware attack
sponsored by Bytes Technology Group
WHITE PAPER: In this white paper, unlock expertise regarding preparing for and surviving ransomware attacks by looking at detailed processes and procedures for detecting, isolating, and recovering data infected by ransomware – including proven methods for securing and protecting data.
Posted: 16 Jul 2020 | Published: 30 Apr 2020

Bytes Technology Group

MITRE ATT&CK: Security Evaluation Overview
sponsored by BlackBerry
VIDEO: MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.
Posted: 22 Jul 2020 | Premiered: 22 Jul 2020

BlackBerry

Panelist Discussion with Q&A
sponsored by BlackBerry
VIDEO: In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

BlackBerry

Is Your Front Door Open and Unlocked for Cyber Criminals?
sponsored by Verizon
RESOURCE: When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon

Onfido & Finiata Case Study
sponsored by Onfido
CASE STUDY: In this case study, follow the journey of Finiata, a German company who helps small businesses with cashflow issues by verifying and de-risking them, as they partner with Onfido to incorporate automation into their verification processes. Read on to explore Finiata’s challenges, what led to their partnership with Onfido, and the outcomes.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Onfido

Securing Your Data Stored in OneDrive: SailPoint Demo
sponsored by SailPoint Technologies
VIDEO: In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.
Posted: 23 Jul 2020 | Premiered: 23 Jul 2020

SailPoint Technologies

Modernizing SOCs with Advanced Threat Intelligence
sponsored by Bitdefender
VIDEO: This webinar provides a comprehensive look at the challenges, threats, and trends as they relate to today’s SOCs, and offers insight into embracing tactical, operational and strategic threat intelligence. Join Jarret Raim and Daniel Clayton, IT security leaders at Bitdefender, as they discuss the need to modernize your SOC.
Posted: 24 Jul 2020 | Premiered: 11 Apr 2019

Bitdefender

Threat Intelligence Report: RSA Conference Edition 2020
sponsored by Mimecast
WHITE PAPER: The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Best Practices for Cloud Data Protection and Key Management
sponsored by Thales
WHITE PAPER: In the era of digital transformation and multi-cloud environments, ensuring the protecting of sensitive data is more important than ever. The following whitepaper highlights cloud data protection best practices, including an in-depth look into cloud native encryption and key management (BYOK, HYOK, RoT & more).
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info