IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed   
Management of Security Reports
 
IDC Government Procurement Device Security Index 2018
sponsored by HP
RESOURCE: Download the IDC Government Procurement Device Security Index 2018 to explore a study on the consideration given to security requirements in public sector procurement of PCs and printers (and print services). Discover the results IDC found and find out the implications of security in procurement.
Posted: 15 Nov 2018 | Published: 31 May 2018

HP

Digital Risk Protection: Understanding Digital Risk
sponsored by Proofpoint, Inc.
RESOURCE: Understand how you can protect your brand and customers from social media, mobile app, and domain threats.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Proofpoint, Inc.

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

You've Been Breached- Now What?
sponsored by CrowdStrike
WHITE PAPER: Learn how to respond to a worst-case cyberattack scenario, actions you can take immediately after an attack, and the long-term planning to stop the next one.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

CrowdStrike

Email+ Enhances PIM Security and Preserves the Native App Experience
sponsored by MobileIron
RESOURCE: Personal information management (PIM) apps are some of the most commonly used apps in the enterprise. But, how can you enhance the security of PIM apps without degrading the native app experience? Download this resource to find out.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

MobileIron

HP Secure Print Analysis: Are your Printers Easy Prey?
sponsored by HP
RESOURCE: How secure are your printers? Get your rating and a personalized checklist.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Why CASB alone isn't enough
sponsored by Open Systems
WHITE PAPER: When it comes to cloud-based workplaces, firewalls and traditional security tools may no longer be enough. Open this white paper to learn how Cloud Access Security Broker (CASB) closes that gap. Plus, come to know how CASB provides 4 critical security functions to allow for deeper visibility and inspection of cloud services.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Open Systems

Cloud Security: Taking the Fear out of Cloud Security
sponsored by UKFast
RESOURCE: Download this resource for 5 cloud security takeaways and a best practice checklist to ensure you pick a cloud provider that is right for your business.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

UKFast

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Five Key Technologies for Enabling a Cyber-Resilience Framework
sponsored by IBM
ANALYST REPORT: Explore this white paper for strategies to modify your data protection and recovery practices to better align with today's malicious attacks.
Posted: 07 Nov 2018 | Published: 30 Jun 2018

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement