Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Enterprise Security Spending

RSS Feed   
Enterprise Security Spending Reports
 
Punycode: Awareness and Protection
sponsored by Cisco Umbrella
VIDEO: The topic of this episode of A Cybersecurity Technical Mini Series: Punycode. But what is Punycode, how does it work & why is it important? To find out, join Chris Riviere, a security expert at Cisco as he further explores this malicious domain tactic.
Posted: 19 May 2020 | Premiered: 16 Dec 2019

Cisco Umbrella

Trends & Future Outlook
sponsored by BlueVoyant
EBOOK: Ransomware is one of the costliest and disruptive cyberattacks plaguing organizations, and each year the list of victims grows. In this e-book, take a closer look at the current and emerging ransomware trends including how victims are targeted and proactive measures that can be taken to prevent future attack. Read on to learn more.
Posted: 11 May 2020 | Published: 11 May 2020

BlueVoyant

DevSecOps vs. SecDevOps
sponsored by Acunetix
RESOURCE: Traditionally, DevOps processes don’t include security, which is why DevSecOps has risen in popularity recently. However, incorrect application security approaches lead some organizations to embrace SecDevOps instead. So, what are the differences between these two approaches?
Posted: 04 Jun 2020 | Published: 24 Sep 2019

Acunetix

IT Ops & Security need to join forces
sponsored by Matrix42
WHITE PAPER: In this white paper, take a closer look at the security challenges for security leaders, the burden of GDPR, and discover a checklist for developing an effective security strategy that automates and integrates workspace management with data loss prevention, threat prevention, data encryption, post-infection protection and compliance.
Posted: 27 May 2020 | Published: 27 May 2020

Matrix42

Combating Threats & Protecting Enterprise Data Across the Modern Workspace
sponsored by VMware International Unlimited Company
DATA SHEET: According to experts, attacks involving “island hopping”, which bypass security tactics with lateral movement within a network, are becoming increasingly troublesome. So, what can organizations do to counter this threat? This data sheet explores a potential answer. Read on to learn more.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

IAM Leaders’ Guide to Privileged Access Management
sponsored by Centrify Corporation
RESOURCE: While traditional identity and access management (IAM) tools offer control of standard user access, they fail to manage shared use of privileged accounts or administrator privilege elevation. This Gartner report provides a comprehensive analysis of privileged access management, designed to be the next step in IAM.
Posted: 20 May 2020 | Published: 22 Jul 2019

Centrify Corporation

Data Security with Okta and Netskope
sponsored by Okta + Netspoke
RESOURCE: As organizations continue to embrace the productivity and cost benefits of cloud capabilities, it’s now more important than ever the make sure the right security checks are in place to secure sensitive data. Read this blog post to discover the common points of failure, explore what a CASB is (and how it can help), and more.
Posted: 27 May 2020 | Published: 18 Jul 2018

Okta + Netspoke

Modernize Your Approach to Compliance and Security
sponsored by Rackspace
RESOURCE: IT security and compliance are critical aspects for protecting today’s business environments. However, the global shortage of security professionals can make acquiring in-house cybersecurity expertise difficult. The following article provides expert guidance for overcoming today’s security and compliance challenges.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Rackspace

Successfully Scaling Cybersecurity for Remote Work: Protect Your People
sponsored by Forcepoint
RESOURCE: One of the key directives for today’s IT and security teams is to safeguard the users and data within their distributed environment and implement cyber defenses that can protect those users—regardless of their location or device. Read on to learn how to keep your remote workers secure against today’s internal and external threats.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

Application Control and Critical Infrastructure Protection
sponsored by VMware International Unlimited Company
DATA SHEET: Reducing unscheduled downtime of critical systems as a result of a cyberattacks should be at the top of every organization’s security to-do list for this year. VMware Carbon Black wants to help. Read this data sheet to learn about their App Control offering, designed to eliminate unplanned downtime and protect critical systems at scale.
Posted: 18 May 2020 | Published: 27 Jan 2020

VMware International Unlimited Company
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info