IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed   
IT Security Managers Reports
 
Selecting a Security Orchestration Vendor
sponsored by Siemplify
WHITE PAPER: This white paper gives an overview of security orchestration, automation, and response technologies, providing you with the tools you need to evaluate vendors. As you select your system, discover which 6 features to look for.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Siemplify

How to Proactively Prevent Security Threats across Endpoints
sponsored by Cylance
RESEARCH CONTENT: This Forrester Total Economic Impact Report investigates the effect of Cylance on organizations' ability to protect their critical assets and endpoints.
Posted: 29 Aug 2018 | Published: 28 Feb 2018

Cylance

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Managing the Risk of Post-Breach or "Resident" Attacks
sponsored by Illusive Networks
RESEARCH CONTENT: Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Illusive Networks

DDoS Defense: EMEA Multinational Banking Group Case Study
sponsored by Radware
CASE STUDY: Find out how one EMEA-based financial services company implemented an on-premise DDoS mitigation appliance along with cloud-based services designed to combat against DDoS and other encrypted threats.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Radware

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

Voice of the Analyst Study: An Inside Perspective on Security Operations
sponsored by Respond Software
ANALYST REPORT: Find out why 45% say reality in the security operations centers (SOCs) does not meet expectations, and learn about the human side of the SOC to gain an understanding and insights to empower your SOC teams to be the best they can be.
Posted: 20 May 2018 | Published: 18 May 2018

Respond Software

How to adapt security for IoT and cloud environments
sponsored by ForeScout Technologies, Inc.
RESEARCH CONTENT: While multi-cloud environments help organizations avoid vendor lock-in and leverage best-of-breed services from various IaaS vendors, there are serious challenges to ensure security – especially IoT endpoint security. Download this IDC research report to learn how you can adopt an agentless and vendor-agnostic security approach.
Posted: 17 May 2018 | Published: 30 Apr 2017

ForeScout Technologies, Inc.

Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

Citrix

Leading Vendors in the DDoS Mitigation Landscape
sponsored by Imperva
RESEARCH CONTENT: This Forrester Wave report identifies the leading DDoS mitigation providers and breaks down how they prevent, detect, and resolve threats. Find out how each provider measures up and see which one is best suited to help you protect your network.
Posted: 09 Aug 2018 | Published: 07 Dec 2017

Imperva
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement