Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Handshake Authentication Protocol

RSS Feed   
Handshake Authentication Protocol Reports
 
Assessing the Economic Impact of Cybereason
sponsored by Cybereason
ANALYST REPORT: As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.
Posted: 25 Aug 2020 | Published: 29 May 2020

Cybereason

Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield
sponsored by Remediant
WEBCAST: Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.
Posted: 28 Aug 2020 | Premiered: Apr 9, 2020

Remediant

Your Guide to Using NGINX
sponsored by NGINX
EBOOK: Read this eBook to learn about NGINX, open source software that can be used as a web server, load balancer, content cache, API gateway and more. This 175-page book covers everything from how to properly install NGINX, to how to configure all the major features, to debugging and troubleshooting.
Posted: 04 May 2020 | Published: 04 May 2020

NGINX

Using Network Segmentation and Microsegmentation to Improve Enterprise Defense
sponsored by Guardicore
WEBCAST: Security architects have historically taken an absolute approach to defense. Namely, if they build an impenetrable wall, then no one can get in. The problem is that if a mistake is made and the wall breached, everything behind it is at risk. This webcast covers microsegmentation, which builds many secure compartments rather than one wall.
Posted: 13 Jul 2020 | Premiered: Aug 22, 2019

Guardicore

The Cost of Insider Threats: Global Report
sponsored by IBM
ANALYST REPORT: The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

IBM

Why & How to Merge Your SD-WAN and Security Strategies
sponsored by SearchNetworking.com
EGUIDE: SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

SearchNetworking.com

How to Take Advantage of 5G Wireless Technology
sponsored by CradlePoint
EGUIDE: As the reality of 5G wireless communications builds, enterprises are looking toward new ways of doing business with higher speed and increased capacity. New 5G wireless technology promises super-fast network speeds and massive capacity. In this e-guide, learn how organizations can begin to prepare for 5G in the enterprise.
Posted: 04 May 2020 | Published: 04 May 2020

CradlePoint

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

7 Strategies to Securely Enable Remote Workers
sponsored by BlackBerry
WHITE PAPER: Remote work is becoming a “must-have” job requirement, and security architectures and network protocols are changing as a result. New security methodologies, like zero trust, are being more heavily considered, and network professionals must work to ensure productivity from anywhere. Read this white paper to learn 7 strategies for remote enablement.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

BlackBerry

Definitive Guide to Moving Target Defense for Automated Bot Attacks
sponsored by BotRX
WHITE PAPER: As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

BotRX
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info