IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats Reports
 
Enterprise Edge and Cloud Security: A Buyer’s Guide
sponsored by Forcepoint
EGUIDE: Determining which cloud security vendor is right for your organization can be challenging. As more people work remotely and there are more ways to connect to the cloud, providing reliable security has never been more important. Read this cloud security buyer’s guide for exclusive evaluating criteria to help you choose with confidence.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Forcepoint

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Case Study: Ledn
sponsored by Clearedin
CASE STUDY: In this case study, discover how Ledn, a cryptocurrency company, was able to achieve better email security and industry-specific compliance requirements through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

Trust Report Executive Summary: Financial Services
sponsored by Synack
ANALYST REPORT: Discover how financial services compares to other industries and learn the impact of the pandemic on security teams during 2020. The 2020 Trust Report Executive Summary for Financial Services is Synack’s essential guide for security professionals to understand how different industries and economic sectors measure up in security preparedness.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Synack

Adapt to Long-Term Remote Work with Adaptive Access Policies
sponsored by Okta
VIDEO: Last year, organizations scrambled to enable their employees to work remotely – but how are organizations preparing for reality of a decentralized workforce for the long term? Watch this webinar to learn more about sustainable best practices for securing and enabling a remote workforce.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Okta

Using Online Identities in Professional Investigations
sponsored by Pipl
WHITE PAPER: As interactions have become more and more digital, online identities have emerged to replace the traditional notion of a user identity. Read this white paper to learn more about the changing nature of identity and how Pipl leverages online identity data to enhance investigations into today’s cyberthreats.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Where CASB and SWG Are Headed
sponsored by Netskope
RESOURCE: Gartner recently released Magic Quadrant reports for both CASB and SWG – but given the trajectory of where network security is headed, should CASB and SWG even be separate capabilities? Read this article to learn more about Gartner’s 2020 findings and Netskope’s 2021 predictions.
Posted: 11 Jan 2021 | Published: 05 Jan 2021

Netskope

Socure ID + Intelligent KYC
sponsored by Socure
DATA SHEET: Socure ID + KYC – also known as ‘Intelligent KYC’, is highly regarded for enabling organizations to unlock massive scale in auto-acceptance and enrollment rates. But how does it stack up against the competition? Read this data sheet to find out.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Socure

Building a New Future for Retail
sponsored by AT&T Cybersecurity and Fortinet
DATA SHEET: Today’s retailers have the opportunity to harness behavioral insights and customer data and transform yesterday’s interactions into streamlined, secure and highly personalized customer experiences. View this infographic to learn more about the threats, opportunities and best practices in modern retail.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

AT&T Cybersecurity and Fortinet

Vendor Comparison and Analysis: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info