IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed   
Managing IT Security Reports
 
Why EDR Technologies are Essential for Endpoint Protection
sponsored by SearchSecurity.com
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

SearchSecurity.com

ServiceNow Security Operations Infographic
sponsored by ServiceNow
RESOURCE: Download this Forrester Total Economic Impact infographic for a summary of interview findings from 3 customers about their experience using ServiceNow Security Operations.
Posted: 29 May 2019 | Published: 29 May 2019

ServiceNow

Top 10 cyber crime stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018
Posted: 07 Jun 2019 | Published: 03 Jan 2019

ComputerWeekly.com

The Total Economic Impact Of Alert Logic SIEMless Threat Management
sponsored by Alert Logic
RESEARCH CONTENT: Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.
Posted: 14 Jun 2019 | Published: 31 May 2019

Alert Logic

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

9 Common Security Mistakes Your Organization Might Be Making
sponsored by Involta
WHITE PAPER: Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

Light SIEM Doesn't Mean Light Security
sponsored by Interfocus
WHITE PAPER: SIEM is a well-established cybersecurity technology however; they are often too costly and complex for small and medium-sized businesses to deploy. For these businesses, finding an alternative "light" SIEM can provide many benefits of a SIEM without being as costly. In this white paper, explore what to consider when looking at alternative SIEM.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Interfocus

Core Principles of Cyber Hygiene in a World of Cloud and Mobility
sponsored by VMware and Intel
WHITE PAPER: No one wants to be the target of cybercriminals, but are you doing enough to protect your business? Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news. Download the whitepaper to learn how to address vulnerabilities before they become disastrous.
Posted: 23 May 2019 | Published: 30 Sep 2018

VMware and Intel

Proactive Security: Software vulnerability management and beyond
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 24 May 2019 | Published: 17 May 2019

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement