IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed   
Device Security Policies Reports
 
Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Avert Cyber Attacks with Proactive Endpoint Hardening
sponsored by Automox
WHITE PAPER: The average cybercriminal takes just 7 days to weaponize a vulnerability, leaving IT teams little time to detect and mitigate attacks. In fact, most organizations take up to 102 days on average to deploy patches. In this white paper, learn how establishing proactive endpoint security can help decrease remediation time and ensure protection.
Posted: 08 Apr 2020 | Published: 08 Apr 2020


Season 2 Episode 3 Diving into WAF and on Ways to Prevent DDoS
sponsored by Rackspace
PODCAST: In this episode of ‘CloudSpotting’ by Rackspace, join the hosts as they explore Web Application Firewalls (WAFs) and the business impacts of DDoS. Give the podcast a listen now.
Posted: 02 Apr 2020 | Premiered: Mar 29, 2019

Rackspace

Getting Customer IAM Right
sponsored by Ping Identity Corporation
WHITE PAPER: For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Ping Identity Corporation

The 4 Levels of Automated Remediation
sponsored by DivvyCloud
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Top Security Orchestration Use Cases
sponsored by Palo Alto Networks
CASE STUDY: While some organizations may attempt to maintain disparate security teams and tools, the security orchestration methodology offers organizations a process for aggregating their security resources to establish a unified strategy. In this white paper, discover a collection of security orchestration use cases. Read on to learn more.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Palo Alto Networks

CyberArk Provides Free Subscription to Alero
sponsored by Cyber-Ark Software
RESOURCE: The emergence of COVID-19 has caused sweeping environmental changes amongst organizations doing their part to stop the spread, enabling more employees to work remotely than ever before. To help ease the transition, CyberArk is planning to offer its secure remote access platform at no cost through May. Read on to learn more.
Posted: 24 Mar 2020 | Published: 18 Mar 2020

Cyber-Ark Software

How to Recognize and Resist Common Email Cons
sponsored by Trustwave
RESOURCE: The frequency and success of phishing attacks is increasing at an alarming rate. Just when organizations believe they understand how to spot an attempt, hackers come up with new ways to infect inboxes. This infographic outlines how to spot a phishing attack by looking at emerging tactics and how to spot them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

Unlocking Omni-Channel with Unified Customer Identity
sponsored by Okta
WHITE PAPER: To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Okta

Your Website Knows Where Your Users Are - But Is It Keeping That Data Secret?
sponsored by Tala Security
WHITE PAPER: It’s one thing to deliberately share user geolocation data without consent, but what if you’re inadvertently giving it away? Learn how you can block and monitor unauthorized access on your website.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Tala Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info