IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed   
Information Security Threats Reports
 
Cloud with Confidence: Re-Imagine Cloud Security
sponsored by Checkpoint Software Technologies
EGUIDE: According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Checkpoint Software Technologies

Managed Detection and Response (MDR) Buyer’s Guide
sponsored by CrowdStrike
WHITE PAPER: By 2024, Gartner predicts that 25% of organizations will be using MDR services. But what exactly is MDR, and why does Gartner predict the rise in popularity? Download this MDR buyer’s guide to learn more about MDR, including core elements and how to navigate the vetting process.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

CrowdStrike

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Powerful and secure data transmission as key element of IT security
sponsored by Rohde & Schwarz
WHITE PAPER: Organizations are becoming increasingly aware of the need to prioritize IT security in order to ensure protection grows at the same rate as productivity. However, the constantly changing nature of IT security can make it unclear where to start. This white paper provides an overview of the IT security fundamentals – read on to get started.
Posted: 11 Aug 2020 | Published: 11 Aug 2020


Everyone as a Trusted Insider
sponsored by Dtex
PRODUCT OVERVIEW: Insider threats are on the rise, and traditional monitoring is too reactionary to handle today’s sophisticated attack methods. In this report, take a closer look at Dtex’s replacement to traditional employee monitoring – designed to promote employee privacy, proactive threat prevention, behavioral understanding of threats, and more.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Dtex

Removing Barriers Between IT And Security
sponsored by VMware International Unlimited Company
RESOURCE: Discussions about IT and security usually revolve around their respective technologies and how they would function independently of one another. But Forrester has reported that the #1 priority in EMEA is to drive collaboration and alignment between IT and security. What else did they have to say on the matter? View this infographic to find out.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

VMware International Unlimited Company

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant

A Proven Approach to Cloud Workload Security
sponsored by CrowdStrike
WHITE PAPER: As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Read this whitepaper to uncover CrowdStrike’s lessons learned, observational insights and expertise.
Posted: 12 Aug 2020 | Published: 12 Aug 2020

CrowdStrike

A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition
sponsored by CyberArk Software, Inc
EBOOK: Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info