IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed   
Device Security Policies Reports
 
Avoiding the Crippling Effects of Ransomware through Early Detection & Response
sponsored by Fidelis
PODCAST: Ransomware remains high on the list of security concerns for enterprises, CISOs and CIOs. But early detection can help your organization, and it’s key in avoiding significant damage and cost. Tune into this podcast to hear former NSA CISO Chris Kubic as he discusses why ransomware is so dangerous and how to protect against it.
Posted: 21 Jan 2021 | Premiered: Jan 21, 2021

Fidelis

Fortinet FortiGate: Bridging the cloud security gap
sponsored by Fortinet, Inc.
VIDEO: Cloud adoption is on the rise, and organizations need to ensure they’re scaling without compromising efficiency, reliability, security or control. Watch this short video to see how Fortinet is helping organization bridge this gap.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Fortinet, Inc.

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Helping Educators Defend their Web Applications with Amazon & Fortinet
sponsored by Fortinet, Inc.
VIDEO: Today’s distributed organizations operate outside what would be traditionally considered a perimeter. As a result, web application and API security are increasingly becoming the first line of defense for critical business asset. Watch this webinar to unlock exclusive insight regarding web app and API security from leaders at AWS and Fortinet.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Financial Grade APIs Using OAuth and OpenID Connect
sponsored by Curity AB
WHITE PAPER: OAuth and OpenID Connect are international standards that define methods for securing APIs. They carry much weight when it comes to financial compliance. In this white paper, explore various aspects of OAuth and OpenID Connect that can be used to conform to the revised Directive on Payment Services (PSD2) and the GDPR.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

Endpoint Security Buyers Guide
sponsored by Sophos
EGUIDE: The endpoint security market has become overpopulated with a wide variety of solutions, too many of which offer indefensible market claims about how secure they are. Read this Endpoint Security Buyers Guide to help clear up the confusion and understand what it takes to make an informed choice.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Sophos

Keeping Remote Workers Safe and Your Work Secure
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Forcepoint

Vendor Comparison and Analysis: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info