IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed   
IT Security Management Reports
 
2018 State of IBM i Security Study
sponsored by HelpSystems
RESEARCH CONTENT: Cyberthreats are becoming more sophisticated every year, raising the importance of proper security controls. Weak passwords, lax system auditing, and overly privileged users leaves your server vulnerable to internal and external threats. In this research report, learn about the full extent of IBM i security exposures and how to correct them.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

TOPICS: 
HelpSystems

Ustgiving Turns to Onfido to Onboard More Customers, and for Seamless Integration
sponsored by Onfido
CASE STUDY: In this case study, learn how JustGiving, a leading social platform for charitable giving, was able to prevent fraudulent activity, increase its identity verification rates, and onboard users more quickly by using Onfido.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Onfido

Cisco Ransomware Defense: Keep Ransomware at Bay
sponsored by Cisco Umbrella
WHITE PAPER: Files and information are the lifeblood of an organization. Keeping this information secure is nonnegotiable. Without the appropriate defenses, ransomware can inflict enough damage to reduce an organization to operating with pen and paper. In this white paper, learn the benefits of Cisco Ransomware Defense.
Posted: 19 Feb 2019 | Published: 31 Oct 2017

TOPICS: 
Cisco Umbrella

TLS 1.3: Are you Ready?
sponsored by F5 Networks
WHITE PAPER: Learn about a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.
Posted: 15 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
F5 Networks

LogRhythm SOMM White Paper 2019
sponsored by LogRhythm, Inc.
WHITE PAPER: The traditional approach to the cybersecurity challenge has been prevention-centric. While this approach is necessary, organizations are increasingly shifting their focus to strategies centered on rapid threat detection and response. In this white paper, learn how LogRhythm can help organizations assess and improve their security operations.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

TOPICS: 
LogRhythm, Inc.

Neustar SiteProtect Customer Success Stories
sponsored by Neustar
CASE STUDY: DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability. In this case study, learn why organizations are turning to Neustar SiteProtect to keep their infrastructures secure.
Posted: 15 Feb 2019 | Published: 08 Feb 2018

TOPICS: 
Neustar

Symantec Web Security Service Advanced Cloud-Delivered Network Security for the Cloud Generation
sponsored by Symantec
WHITE PAPER: Today's enterprise-security reality: Devices, data, and applications are outside of your physical control—and all of it must be managed and secured. In this guide, learn about advanced security tools that can help you overcome the security challenges of the cloud generation.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

Four Easy Ways Central Logging Improves Security Posture
sponsored by Splunk Services UK Ltd
WHITE PAPER: Cybersecurity tools send alerts to help identify malicious activity, but the burden remains with the organization to figure out whether that alert is meaningful and if and how it fits into a larger chain of malicious activity. In this white paper, explore 4 basic data sources that you can leverage for immediate visibility of security activities.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

TOPICS: 
Splunk Services UK Ltd

Evolving Your Security Architecture to Meet Current and Future Needs
sponsored by Dell SecureWorks
WHITE PAPER: The security of an organization is dependent on the quality of its enterprise information security architecture. A security architecture should be designed for the specific organization it's going to protect. In this white paper, learn how to define your security needs and reassess your security architecture as new threats develop.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Dell SecureWorks

Inside the Mind of a Hacker
sponsored by Irdeto
WHITE PAPER: In today's connected world, you need a different software security approach, one that focuses more on what criminal hackers are trying to accomplish. In this white paper, learn how to shift your focus to a strategy that targets cybercriminals where it hurts them most: their business model.
Posted: 22 Feb 2019 | Published: 26 Sep 2018

TOPICS: 
Irdeto
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement