IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed   
IT Security Management Reports
 
The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Identity and Access Management: Automated Peace of Mind
sponsored by Imprivata
RESOURCE: Inside, discover how your healthcare organization can benefit from an identity access management (IAM) solution purpose-built for healthcare, and learn how an IAM can help your organization ensure immediate access to vital patient care information, check test results from mobile, meet DEA requirements, and more.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata

Privileged Access Management in the Modern Threatscape
sponsored by Centrify Corporation
WHITE PAPER: Privileged access remains the preferred vector for attackers, and most organizations aren't taking the very basic steps to secure it. Dive into this 2019 Centrify Privileged Access Management Survey to learn about their findings for securing the modern threatscape with zero trust privilege.
Posted: 04 Sep 2019 | Published: 19 Feb 2019

Centrify Corporation

Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER: Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Proofpoint

Privileged Access Management as a Service: What's in it for You?
sponsored by CyberArk Software, Inc
WEBCAST: In this webcast, learn how privileged access management as a service benefits your organization to help you stay secure.
Posted: 08 Oct 2019 | Premiered: Oct 8, 2019

CyberArk Software, Inc

The Study on the Cyber Resilient Organization
sponsored by IBM
ANALYST REPORT: Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient's latest report. Download the report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture.
Posted: 19 Sep 2019 | Published: 30 Apr 2019

IBM

Security Podcast: Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
PODCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this podcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Phoenix Children's Takes on Cybersecurity
sponsored by Blackberry Cylance
CASE STUDY: In this case study, learn how Phoenix Children's Hospital used CylancePROTECT to help protect against attackers hacking into patient data and disrupting hospital operations.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Blackberry Cylance

2019 Cyberthreat Defense Report
sponsored by Gigamon
RESOURCE: Download this infographic to uncover some key findings from CyberEdge Group's 6th annual Cyberthreat Defense Report.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Gigamon

Top Reasons Why Identity Governance Matters for Chief Information Officers
sponsored by Imprivata
WHITE PAPER: Forward-looking CIOs are turning to healthcare-specific technologies to automate identity governance functions, reduce operating expenses, and free up staff to focus on business-critical tasks. In this white paper, learn how Imprivata Identity Governance can help address Identity and Access Management challenges for CIOs.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement