IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed   
Network Perimeter Security Reports
 
2019 Data Breaches in Review
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: 2019 broke the record for most data beaches in any single year, both in terms of number of breaches and records exposed. This report examines the top 20 data breaches of 2019, breaking down the methods used and the impact of each attack.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Arctic Wolf Networks, Inc.

IDT: ShieldX Customer Testimonial
sponsored by ShieldX
VIDEO: View this customer testimonial video to see how IDT Telecom saw security success with ShieldX.
Posted: 13 Feb 2020 | Premiered: 13 Feb 2020

ShieldX

Core - DNS - Threat Spotlight: Emotet
sponsored by Cisco Umbrella
WEBCAST: In this edition of ‘A Cybersecurity Technical Mini Series’, take a closer look at the history and evolution of Emotet malware. This webinar highlights Emotet’s infection chain and modules, how this malware can affect your organizations & best practices for avoiding an infection.
Posted: 11 Feb 2020 | Premiered: Oct 31, 2019

Cisco Umbrella

Core - DNS - Network Security for SD-WAN
sponsored by Cisco Umbrella
WHITE PAPER: According to a 2019 study, 68% of security breaches involved branch offices and roaming users as the source of compromise. Download this white paper to find out how to deliver network security for today's evolving WAN networks and protect remote and roaming users.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: This short story follows the journey of two remote workers as they face the cybersecurity threats associated with remote access, VPNs and cloud platforms. Read on to learn how they overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

Rethinking Networks for the Next Decade
sponsored by GTT Americas, LLC
ANALYST REPORT: Today, the rapid pace of change can make it difficult for enterprise IT organizations to know what resources the company will need in the future. In this Ovum report, learn how organizations can prepare for the unknown by implementing a flexible network that can quickly adapt to changing business needs.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

GTT Americas, LLC

Accelerating Detection and Response with ThreatQ
sponsored by ThreatQuotient
CASE STUDY: In this case study, uncover how a US-based financial services organization partnered with ThreatQuotient to streamline their existing resources and accelerate threat detection and response to act in a matter of hours or days.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

ThreatQuotient

Collective Offense Calls for Collective Defense
sponsored by IronNet
WHITE PAPER: Advanced cybersecurity systems, such as AI and ML, are not preventing cyber incidents. Disparate efforts to thwart attacks are unlikely to remain sustainable as threats increase. Download this white paper and discover the collective defense platform: where security teams aggregate their threat intelligence to increase awareness and response time.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

IronNet

How to Build a Winning Cybersecurity Team
sponsored by Global Knowledge
WHITE PAPER: Just like a sports team, cybersecurity teams need to be carefully built and managed in order to reach peak performance. Effective cybersecurity teams also require adequate processes and technologies to support their efforts. So, what should you consider when building a winning cybersecurity team? Read on to find out.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Global Knowledge
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info