IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed   
Device Security Policies Reports
 
Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

TOPICS: 
InteliSecure

The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

TOPICS: 
Cylance

GDPR & Online Proofing: An Inconvenient Truth
sponsored by Jumio
EBOOK: Companies around the world are busy implementing the necessary policies and procedures to ensure customer data is appropriately handled, in order to comply with GDPR. Keep reading to find out if your data processor is effectively managing and exceeding the standards laid out in GDPR.
Posted: 14 Jun 2018 | Published: 14 Jun 2018

TOPICS: 
Jumio

Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER: In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

TOPICS: 
Gemalto

Everything You Need to Know About Application Security Policies
sponsored by Veracode, Inc.
RESOURCE: Lacking strong application security policies, your developers and security teams might be overwhelmed by alerts and notifications. Explore some key points to help build your app security program that gives you only the alerts you need.
Posted: 03 May 2018 | Published: 03 May 2018

TOPICS: 
Veracode, Inc.

Security Automation and Orchestration (SAO) Capabilities
sponsored by Swimlane
WHITE PAPER: Security Automation and Orchestration (SAO) platforms help security teams manage a growing volume of alerts and incidents more efficiently by automating manual response workflows. Download this white paper to learn about SAO platforms, and explore common features and capabilities.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

TOPICS: 
Swimlane

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

TOPICS: 
Splunk

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

TOPICS: 
ComputerWeekly.com

Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

TOPICS: 
Citrix

Top Mobile Security Threats: Insight Into Threats and Attackers
sponsored by Lookout
EGUIDE: Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
Posted: 30 Mar 2017 | Published: 28 Mar 2017

TOPICS: 
Lookout
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement