IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed   
Managing IT Security Reports
 
14 Zero Trust eXtended (ZTX) Ecosystem Providers
sponsored by Okta
ANALYST REPORT: Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.
Posted: 06 Dec 2019 | Published: 29 Oct 2019

Okta

Anatomy of Magecart Attacks
sponsored by PerimeterX
WEBCAST: Magecart is an umbrella name for cybercriminal groups practicing digital skimming, that hack their way into your customers credit card details, but what makes these attacks so unique? In this webinar, join industry experts at PerimeterX as they explore the anatomy and impacts of magecart skimming attacks.
Posted: 11 Dec 2019 | Premiered: Dec 11, 2019

PerimeterX

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium

The New Era of Fraud: A Bot-Driven Threat
sponsored by F5 Networks
WHITE PAPER: With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

F5 Networks

Pitney Bowes - Okta + F5 joint case study
sponsored by Okta
CASE STUDY: In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Getting Started with Zero Trust: Never Trust, Always Verify
sponsored by Okta
WHITE PAPER: As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Tanium: Unified Cloud Visibility & Control
sponsored by Tanium
PRODUCT OVERVIEW: In this brief, find 7 best practices shared by organizations that have been successful in securely migrating to the cloud. Also, learn how Tanium can help you accelerate cloud migration strategies with low risk.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach
sponsored by Optiv
CASE STUDY: In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Optiv

Accelerating the Journey to Passwordless Authentication
sponsored by IBM
WHITE PAPER: A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.
Posted: 19 Nov 2019 | Published: 31 Jul 2019

IBM

Global Smart Meter Manufacturer Secures Move to Microsoft Intune with Lookout
sponsored by Lookout
CASE STUDY: With organizations growing more reliant on remote access capabilities, endpoint security becomes necessary to meet internal and industry security regulations. In this case study, discover how Landis+Gyr, an energy management leader, developed and deployed an advanced mobile security strategy to protect their endpoints
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Lookout
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement