IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed   
Management of Security Reports
 
Your Endpoint Security Strategy Needs a Hug
sponsored by Verizon
RESOURCE: Traditional endpoint security has long been a crutch in the fight against hackers, but it just doesn't cut it anymore. Those tools rely on known malware signatures to be effective but they can't defend against zero-day attacks and new ransomware variants. In this blog post, discover 5 areas that you can address to ease your endpoint suffering.
Posted: 24 May 2019 | Published: 24 May 2019

Verizon

TITUS Military Classification Tool
sponsored by TITUS
DATA SHEET: In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

MSSP Buyer's Guide: Grow Your Managed SOC Business with IBM Security
sponsored by IBM
PRODUCT OVERVIEW: This eBook outlines the benefits of IBM Security's MSSP Partner Program and explains how their threat detection and response solutions can help you capitalize on this unique market opportunity. Download now to learn how this program can help you scale your growth and increase your revenue potential.
Posted: 07 Jun 2019 | Published: 28 Feb 2019

IBM

Telstra security report 2019 – APAC edition
sponsored by Telstra
RESEARCH CONTENT: The latest edition of this Telstra study enables you to benchmark your organization's security posture against other companies in your region. The APAC report also highlights a change in the corporate landscape with the convergence of cyber and electronic security.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Telstra

What are your Public Cloud Security Risks?
sponsored by Lacework
WHITE PAPER: There are many good business reasons why the public cloud has become a go-to environment for fast infrastructure expansion. But is it secure? Read on to learn about the cloud's unique security challenges and how continuous, real-time monitoring, analysis, and alerting can help your organization stay secure.
Posted: 29 May 2019 | Published: 29 May 2019

Lacework

Cybersecurity Analytics and Operations in Transition
sponsored by Dell SecureWorks
RESEARCH CONTENT: Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, compromise IT assets, and lead to extensive damages. This is where threat detection and response come into play. In this research report, review an assessment of organizations' cybersecurity analytics and operations plans, successes, and struggles.
Posted: 28 May 2019 | Published: 31 Jul 2017

Dell SecureWorks

The Impact of Cyber-Based Financial Fraud
sponsored by SkOUT
WHITE PAPER: Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

Cloud Security Gateways, Q1 2019
sponsored by Symantec
RESEARCH CONTENT: Protecting cloud applications from data loss or theft, privacy abuses, and other risks is challenging. In the evolving market for cloud security gateways (CSGs), enterprises want to monitor and secure all their cloud workloads using few solutions. In this report, learn more about the top CSG vendors and what you should look for in a provider.
Posted: 21 Jun 2019 | Published: 20 Feb 2019

Symantec

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

ServiceNow Security Operations Infographic
sponsored by ServiceNow
RESOURCE: Download this Forrester Total Economic Impact infographic for a summary of interview findings from 3 customers about their experience using ServiceNow Security Operations.
Posted: 29 May 2019 | Published: 29 May 2019

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement