IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed   
IT Security Management Reports
The Truth about Shadow IT
sponsored by Cisco Umbrella
RESOURCE: Employees in every industry are expected to work quickly, but they're often frustrated by company-issued apps. As a result, they're downloading personal apps to get the job done instead of using secure, enterprise-approved tools. This is called shadow IT. In this infographic, learn how your organization can stop shadow IT in its tracks.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Real-Time Mainframe SIEM 101
sponsored by BMC
WHITE PAPER: SIEM systems have been the industry standard for enterprise network security, but the mainframe has been left out of this predominantly distributed discipline. In this white paper, learn how to launch a mainframe SIEM initiative. Also explore 4 steps to ensure malicious mainframe activity triggers a notification to the appropriate security system.
Posted: 14 May 2019 | Published: 14 May 2019


More Is Not More: Busting the Myth That More Threat Intel Feeds Lead to Better Security
sponsored by ThreatConnect
WHITE PAPER: It's a common misconception that a large quantity of threat intelligence feeds leads to more effective security. However, instead of adding more threat intel feeds, you should incorporate the feeds that provide the most value to your security. This white paper will help you decide which threat intel feeds are relevant to your organization.
Posted: 01 May 2019 | Published: 01 May 2019


Cloud in the Crosshairs
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: In 2018, enterprises continued to wrestle with challenges such as ransomware, insider threats, and DDoS attacks, all while struggling to simplify operations. In this research report, explore key findings from NETSCOUT's 14th annual worldwide infrastructure security report.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
RESEARCH CONTENT: To understand exactly how organizations are addressing technology-based disruption, Tanium commissioned a study of business decision-makers, CIOs and CISOs. Download this report to discover key results including how to keep complex systems running smoothly and defend them against the range of threats plaguing modern businesses.
Posted: 09 Apr 2019 | Published: 09 Apr 2019


Security Automation with Ansible
sponsored by Red Hat
WEBCAST: Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.
Posted: 15 May 2019 | Premiered: May 15, 2019

Red Hat

Security Awareness Computer-Based Training
sponsored by Proofpoint
RESEARCH CONTENT: The market for security awareness computer-based training (CBT) is driven by the recognition that people play a critical role in an organization's overall security and risk. Organizations must invest in tools that increase awareness. In Gartner's Magic Quadrant report, explore security awareness CBT market trends and key vendors in the field.
Posted: 07 May 2019 | Published: 13 Nov 2018


TITUS Military Classification Tool
sponsored by TITUS
DATA SHEET: In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.
Posted: 15 May 2019 | Published: 15 May 2019


Telstra Security Report 2019
sponsored by Telstra
RESEARCH CONTENT: As our lives become more connected, cybersecurity has emerged as a top-of-mind issue for business leaders and governments. With cybercrime increasing, many organizations are experiencing breaches. Download the Telstra Security Report 2019 to learn more about the current security landscape and explore how security professionals are managing risk.
Posted: 17 Apr 2019 | Published: 17 Apr 2019


State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell EMC
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 14 May 2019 | Published: 14 May 2019

Dell EMC

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement