Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Enterprise Security Spending

RSS Feed   
Enterprise Security Spending Reports
 
Why IT directory issues should no longer be viewed as the cost of doing business
sponsored by Okta
VIDEO: Identities are at the foundation of how an organization monitors and protects access to critical data – as a result, finding ways to secure and manage these identities becomes critical. In this short video, discover how IT directories can be used to support these initiatives – watch now to get started.
Posted: 04 Feb 2021 | Premiered: 04 Feb 2021

Okta

HOW TO PREVENT PAYMENTS FRAUD AMID GLOBAL DISRUPTION
sponsored by Feedzai
EBOOK: The financial services industry was heavily disrupted by the coronavirus outbreak – but this didn’t mean that hackers and fraudsters were going to take it easy on them. This e-book, How to Prevent Payments Fraud amid Global Disruption, highlights today’s security challenges, best practices and future opportunities facing the financial industry.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Feedzai

Manage Secrets throughout DevSecOps with Red Hat and CyberArk
sponsored by Red Hat
VIDEO: Emphasizing security throughout DevOps, also known as DevSecOps, has become a common practice across organizations. This webinar highlights how identity and access management (IAM) can fit into the software development lifecycle – watch this webinar to explore the role of IAM in DevSecOps.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

BlackBerry Cyber Suite
sponsored by BlackBerry
PRODUCT OVERVIEW: In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

BlackBerry

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Forcepoint

How Zivver Helps Organisations with ISO 27001 Compliance
sponsored by Zivver
PRODUCT OVERVIEW: Complying with all 114 of the controls required for ISO 27001 can be a complicated process. This solution brief provides a comprehensive list of the 22 controls covered in Zivver’s platform, designed to help your organization meet ISO 27001 compliance requirements.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

Zivver

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

Improving Security and Compliance in Hybrid Cloud with Automation
sponsored by Red Hat
WEBCAST: Massive global shifts towards hybrid cloud environments are making cybersecurity more difficult to achieve than ever before. This Red Hat webinar offers exclusive insight into how automation can improve security and compliance in hybrid cloud environments – watch now to get started.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021

Red Hat

Four Cybersecurity Essentials That Your Board Of Directors Wants To Know
sponsored by Cymulate
EGUIDE: For security leaders, one of the most daunting tasks is explaining your organization’s cybersecurity strategy and needs to a nontechnical audience – especially when that audiences consists of executives and the board of directors. Read this e-guide to learn about which key metrics to highlight and how to make your case to a room of execs.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Cymulate

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences