IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed   
Device Security Policies Reports
 
Seven Strategies to Securely Enable Remote Workers
sponsored by BlackBerry
WHITE PAPER: Remote work is becoming a "must-have" job requirement, and security architectures and network protocols are changing as a result. New security methodologies, like zero trust, are being more heavily considered, and network professionals must work to ensure productivity from anywhere. Read this white paper to learn 7 strategies for remote enablement.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

BlackBerry

The Future of Remote Work: Securing A Distributed Workforce
sponsored by VMware International Unlimited Company
RESOURCE: Nearly all non-essential employees have been working remotely since March, a trend that is likely to continue for the foreseeable future. To help organizations acclimate, VMware offers their Carbon Black Cloud tool, which looks to consolidate and unify security efforts across all control points – read on to explore the key features.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware International Unlimited Company

Managing Identity So You Can Scale
sponsored by Okta
WHITE PAPER: Today’s users expect an experience that is not only frictionless and personalized, but also secure. To meet this demand, organizations are turning to customer identity and access management (CIAM) tools. Read this white paper to learn more about Okta’s CIAM offering and how it’s benefitted some of their key partners.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Okta

7 Strategies to Securely Enable Remote Workers
sponsored by BlackBerry
WHITE PAPER: Remote work is becoming a “must-have” job requirement, and security architectures and network protocols are changing as a result. New security methodologies, like zero trust, are being more heavily considered, and network professionals must work to ensure productivity from anywhere. Read this white paper to learn 7 strategies for remote enablement.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

BlackBerry

The 2020 Spotlight Report on Office 365
sponsored by Vectra AI
WHITE PAPER: Account takeovers are responsible for upwards of $7 billion in annual losses across multiple industries, according to Forrester. The following Spotlight Report from Vectra provides a comprehensive analysis of the cyberthreats targeting Office 365 users, and why some of these attacks are succeeding – read on to learn more.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: SOCs are a critical aspect to effectively identifying and addressing potential threats – however the evaluation process and subsequent RFP drafting process can be overwhelming with the amount of available options. The following white paper provides evaluation best practices and tips to guide RFP drafting to help you get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Cysiv

Key Considerations for Securing 5G Network Traffic
sponsored by Verizon
WHITE PAPER: The growth of enterprise data is putting pressure on technology professionals to secure and govern it. The generation, networking and storage of this data means that 5G will affect every company’s security posture. So, how can you be prepared for what’s coming? Read this white paper to learn how 5G security will be influenced by evolving threats.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Verizon

What is Security's Role in Digital Transformation?
sponsored by Rackspace
RESOURCE: The past few years have seen massive upticks of digital transformations – offering businesses the ability to enhance the speed, agility and quality of their DevOps teams and lifecycles. But given the current threat landscape, it's critical to understand the role of security in digital transformations – read on to learn more.
Posted: 13 Oct 2020 | Published: 25 Feb 2020

Rackspace

Technical Overview: Reducing Risk with a Remote Workforce
sponsored by SolarWinds, Inc.
WEBCAST: Working from home has drastically changed the IT security paradigm. This webinar provides an overview of those changes, highlights the current challenges and opportunities, and offers best practices for reducing risk for your remote workforce.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

SolarWinds, Inc.

IT Risk Management (ITRM): Vendor Comparison Matrix
sponsored by ServiceNow
RESOURCE: IT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.
Posted: 09 Oct 2020 | Published: 11 Aug 2020

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info