IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information Reports
 
Endpoint Sensor: Understand the source, impact, and spread of advanced threats with endpoint detection and response (EDR)
sponsored by Trend Micro, Inc.
RESOURCE: Malware can manifest itself in your enterprise networks, bypassing traditional security technology. Fortunately, Trend Micro's Endpoint Sensor gives insight to detections by allowing threat investigators to explore detections and hunt for new threats. In this resource, learn more key features of Endpoint Sensor.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

Trend Micro, Inc.

Surrey Satellite Technology Enhances Ground Operations With Real-Time Infrastructure Visibility
sponsored by Splunk Services UK Ltd
CASE STUDY: Surrey Satellite Technology (SSTL) is a provider of operational and commercial satellites. SSTL required a solution that would ensure their engineers and researches had secure access to the IT tool they needed. In order to do this, SSTL implemented Splunk. In this case study, learn about the benefits SSTL saw after deploying Splunk.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

Splunk Services UK Ltd

Transform Incident Response Lifecycle Management with VIA's Digital Operations Solutions
sponsored by Vitria Technology, Inc.
WHITE PAPER: Real-time analytics, AI, machine learning, and IoT are transforming Incident Response Lifecycle Management and providing enormous operational improvements in telecom service performance. In this white paper, learn how VIA and Digital Operations Solutions support incident response lifecycle management.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

Vitria Technology, Inc.

Why Differential Privacy Should Be Top of Mind for Data Science and Governance Teams
sponsored by Immuta, Inc
WHITE PAPER: Download this white paper to find out why differential privacy should be top of mind for data science and governance teams and uncover the 2 common approaches when it comes to differential privacy.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

Immuta, Inc

How the Rapid Adoption of Public Clouds is Affecting Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Companies are increasingly moving data and applications to public cloud platforms. However, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. In this white paper, learn how public clouds demand particular attention from IT security managers for 3 reasons.
Posted: 28 Feb 2019 | Published: 28 Sep 2018

Fortinet, Inc.

Managed Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: As attackers become more sophisticated, enterprises must turn to advanced detection and response capabilities. Correlating threats to get a complete picture of a targeted attack is an effective detection strategy. However, the shortage in cybersecurity skills causes enterprises struggle with this. In this resource, learn how Trend Micro can help.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

Trend Micro, Inc.

Strategies to Get IAM Right
sponsored by One Identity
WHITE PAPER: How can you make sure that your IAM project doesn't become another wreck on the road to security and compliance? In this e-book, find common characteristics of failed projects, the consequences of a poorly executed IAM program, and a recipe for IAM success.
Posted: 28 Feb 2019 | Published: 31 Dec 2017

One Identity

Fraud Prevention
sponsored by Riskified
WHITE PAPER: For online retailers, CNP fraud is a serious problem that will only get larger as the eCommerce market continues to grow. Despite this harsh reality, senior management isn't giving this issue the attention that it deserves. In this white paper, learn about the value of fraud management operations.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Riskified

Complying with CECL
sponsored by SAS
WHITE PAPER: The Financial Accounting Standards Board's Current Expected Credit Loss (CECL) standard introduces a new model for the recognition and measurement of credit losses for loans and debt securities. In this white paper, discover findings from the SAS/GARP survey which gauged lenders' progress and concerns in gearing up for the new model.
Posted: 19 Mar 2019 | Published: 26 Apr 2018

SAS

DreamWorks Animation Applies HP Inc.'s Expertise and Experience to Reinforce Print and Document Security
sponsored by HP
CASE STUDY: In this case study, learn how a large film production studio, DreamWorks Animation, partnered with HP Inc. to address its print security needs. The case study also provides recommendations for addressing your organization's printer security needs.
Posted: 13 Mar 2019 | Published: 31 Mar 2018

HP
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement