Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Enterprise Security Spending

RSS Feed   
Enterprise Security Spending Reports
 
Cyber Resilient Organization Report 2020
sponsored by IBM
ANALYST REPORT: The volume of cybersecurity incidents has risen, causing disruption to IT and business processes. In fact, 51% of organizations reported a significant business disruption during the past two years due to a cybersecurity incident. What did they report regarding cyber resiliency? How are they planning for the future? Read this report to find out.
Posted: 27 Aug 2020 | Published: 31 Jul 2020

IBM

How to Eliminate Security & Compliance Impediments on Your Journey to the Cloud
sponsored by AWS - Anitian
VIDEO: In this webcast, learn the business, security, and DevOps benefits of automating security, get an inside look at security automation and how it helps DevOps teams, and discover how to achieve the fastest time-to-market possible on AWS by leveraging cloud security & compliance automation.
Posted: 09 Sep 2020 | Premiered: 03 Sep 2020


The Impact of COVID-19 On IT and Cybersecurity
sponsored by IBM
WHITE PAPER: What changes were necessary to address the unexpected global pandemic? What types of cybersecurity challenges did the transition present? How are organizations doing? For answers to these questions, read this survey, conducted by ESG, to gain a perspective on the cybersecurity impact of COVID-19 as well as implications for the future.
Posted: 26 Aug 2020 | Published: 29 Jul 2020

IBM

Demystifying Converged OT IoT Security
sponsored by Capgemini
RESOURCE: The emergence of IoT devices has created additional stress among IT and security teams. In fact, 80% of security professionals agree that IoT breaches are more expensive to find and fix than traditional breaches. Since it doesn’t look like IoT is going anywhere, what can these teams to do address these threats? Read on to find out.
Posted: 03 Sep 2020 | Published: 06 Apr 2020

Capgemini

Working Remotely is the New Normal
sponsored by Automox
RESOURCE: The shift towards a remote workforce isn’t a novel concept – however it wasn’t until the pandemic first arrived that it became such a widespread priority. To help ensure you’re on the right track, this infographic highlights 5 key considerations for securing your remote workforce without sacrificing efficiency.
Posted: 25 Aug 2020 | Published: 25 Aug 2020


TCO Study of WSUs and SCCM
sponsored by Automox
WHITE PAPER: Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.
Posted: 24 Aug 2020 | Published: 24 Aug 2020


Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

Survey Report: Evolution of the CASB
sponsored by Proofpoint
ANALYST REPORT: In the wake of COVID-19, work-from-home orders issued by most companies and governments have accelerated the digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the enterprise. View this report to get a perspective on the use of CASBs.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Proofpoint

How Lookout Helps You Align with NIST Guidelines
sponsored by Lookout
CASE STUDY: When it comes to structuring cybersecurity strategies and initiatives, many organizations turn to guidelines and best practices outlined by the National Institute of Standard and Technology (NIST). In this case study, take a closer look at NIST’s updated mobile security guidelines and discover how Lookout can help get you aligned.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Lookout

The Three Mega Trends CISOs Need to Watch
sponsored by Hyperproof
EGUIDE: Today’s CISO faces pressure on many fronts – an expanding threat landscape, an exponentially growing volume of data and increasingly stringent data privacy laws. Read this guidebook to discover how CISOs can navigate and manage each of these challenges, and more.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Hyperproof
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info