IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information Reports
The City of Frankfurt Enables Work from Home with Two-Factor Authentication
sponsored by One Identity
CASE STUDY: Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.
Posted: 12 Feb 2018 | Published: 31 Dec 2015

One Identity

Secure Applications in the Development Phase with DevSecOps
sponsored by Veracode, Inc.
RESOURCE CENTER: Effective application security is more than a one-time scan. Security needs to be continually assessed during every step of the app development process. This three step process puts you on the path to developing a mature app security program.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Veracode, Inc.

Security Trends: Data Theft and Ransomware Plague Healthcare Organizations
sponsored by IBM
WHITE PAPER: According the Cost of a Data Breach Study, the healthcare industry's data breach cost, $355 per record, is more than twice the mean across all industries of $158 per record. Inside this resource uncover how to protect your healthcare organization while reducing cost and complexity and proactively hunt and respond to threats.
Posted: 02 Mar 2018 | Published: 31 Dec 2016


The Five Essential Capabilities Of An Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: This white paper outlines how you can gain visibility into potential vulnerabilities by adopting an analytics-driven SOC. Read on to find 5 capabilities that are "must-haves" in this type of system.
Posted: 02 Mar 2018 | Published: 02 Mar 2018


The Rising Face of Cybercrime: Ransomware
sponsored by BitSight
RESEARCH CONTENT: This BitSight Insights Report examines the cybersecurity performance of nearly 20,000 organizations in the face of rising ransomware attacks. Uncover the report's 5 key findings about the different types of ransomware attacks across industries like education, government, and finance.
Posted: 07 Feb 2018 | Published: 07 Feb 2018


Manufacturing Company Automates with Enterprise Security SIEM
sponsored by Splunk
CASE STUDY: Discover what benefits this manufacturing company gained by adopting a SIEM system to bolster their small security team.
Posted: 25 Jan 2018 | Published: 25 Jan 2018


Cloud Service Provider Reduces Impact of Global Denial-of-Service Attacks by Over 90 Percent
sponsored by Juniper Networks
CASE STUDY: In this case study learn how, a managed hosting provider based in the Netherlands, reduced the impact of global DoS attacks by over 90% and reduced the amount of trouble tickets lowering service costs.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017


Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

Top 9 DDoS Threats Your Organization Must Be Prepared For
sponsored by Radware
RESOURCE: Utilize this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement