IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information Reports
 
Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

Proactive Security: Software vulnerability management and beyond
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 24 May 2019 | Published: 17 May 2019

ComputerWeekly.com

Transforming Cloud Connectivity & Security in Distributed Networks
sponsored by Forcepoint
VIDEO: In this webcast, learn how Forcepoint branch security can enable highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
Posted: 29 May 2019 | Premiered: 29 May 2019

Forcepoint

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


3 Minutes Until the Apocalypse
sponsored by Acalvio
WHITE PAPER: Most organizations utilize a SIEM in their SOC to aggregate, correlate and prioritize alerts presented to the frontline SOC Analyst. However, with a myriad of logs feeding into the SIEM, it is a daunting task to keep up with the alerts on the screen. In this white paper, learn 3 things security teams can do to make their lives better.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Acalvio

Proofpoint Security and Compliance for Microsoft Office 365
sponsored by Proofpoint
DATA SHEET: Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019

VMware

How to Capitalize on the Multi-billion Dollar Market for Managed Security Services
sponsored by IBM
WEBCAST: Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

IBM

Cybersecurity Analytics and Operations in Transition
sponsored by Dell SecureWorks
RESEARCH CONTENT: Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, compromise IT assets, and lead to extensive damages. This is where threat detection and response come into play. In this research report, review an assessment of organizations' cybersecurity analytics and operations plans, successes, and struggles.
Posted: 28 May 2019 | Published: 31 Jul 2017

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement