IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed   
National Security Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Key Considerations for a Successful Zero Trust Security Strategy Webinar
sponsored by Aporeto
WEBCAST: Tune into this 60 minute webinar to hear Trace3 and Aporeto discuss the Zero-Trust security framework components and what to consider for a successful cloud security strategy.
Posted: 09 Oct 2019 | Premiered: Oct 9, 2019

Aporeto

Securing the Web Perimeter
sponsored by Cloudflare
WHITE PAPER: In this white paper, learn how WordPress, VPNs, outdated TLS, and web apps built with modern stacks can increase the risk of security breaches and how to reduce that risk.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Cloudflare

The Superpower of “Yes! But…”
sponsored by PortSys
RESOURCE: There was a time not so long ago when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO! In this blog post, learn how and why security’s superpower of “NO!” turned into “Yes! But…”
Posted: 09 Oct 2019 | Published: 09 Oct 2019

PortSys

Penetration Testing: Protect Critical Assets Using an Attacker’s Mindset
sponsored by IBM
WHITE PAPER: The proliferation of financial losses and brand damage stemming from security breaches means organizations need to be proactive in protecting their most valued assets. In this white paper, learn how IBM X-Force Red penetration testing services can help your organization identify and fix critical vulnerabilities before criminals exploit them.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

IBM

An Analysis of the Market for Data Loss Prevention Vendors
sponsored by Forcepoint
ANALYST REPORT: Tap into this analysis of the market for data loss prevention solutions that reveals top players, trail blazers, specialists and mature players.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

ComputerWeekly.com

A Risk-Adaptive Approach to Dynamic Data Protection
sponsored by Forcepoint
WHITE PAPER: By using Dynamic Data Protection, organizations can automate policy enforcement to dynamically respond to changes in risk within an organization. Read on to learn more about the end-to-end, human-centric security architecture.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Forcepoint

JetBrains Extends Security with Cisco Stealthwatch Cloud on AWS
sponsored by Amazon Web Services
CASE STUDY: When JetBrains migrated to Amazon Web Services (AWS), it realized it needed a solution to combat security risks. In this case study, learn how JetBrains was able to achieve visibility across their AWS environment, continuous monitoring for suspicious activity and much more with Cisco Stealthwatch Cloud on AWS.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Amazon Web Services

Assessing the Security and Compliance Posture of an AWS Account and Its Assets
sponsored by CloudPassage
VIDEO: CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.
Posted: 10 Oct 2019 | Premiered: 10 Oct 2019

CloudPassage
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement