IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed   
Network Perimeter Security Reports
 
Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

SD-WAN: Accelerating network transformation in APAC
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

ComputerWeekly.com

Benefits of Managed Network Services in a Software-Defined Era
sponsored by Comcast Business
ANALYST REPORT: IDC predicts that worldwide spending on DX will grow at a compound annual rate of 17.9% through 2021 to more than $2.1T. This means that organizations will need WANs that can handle the influx of bandwidth from managed services. View this report to learn more.
Posted: 03 Sep 2020 | Published: 30 Jun 2020

Comcast Business

Email Security for Microsoft 365
sponsored by Vade Secure
WHITE PAPER: Cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. You may have enabled email security add-ons for Microsoft 365, but you’re not as safe as you think. Read this white paper to learn how to keep your email safe from phishing, spear phishing and zero-day attacks.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Do You Think Your Endpoint Security Strategy Is Up to Scratch?
sponsored by HP Inc
IT BRIEFING: IDC surveyed 500 security decision makers and influencers at organizations in key European and North American markets, across vertical sectors from across the spectrum including banking and finance, telco, and energy. Respondents were questioned on key factors pertaining to endpoint security strategy. Read the full survey to learn the results.
Posted: 15 Sep 2020 | Published: 31 Oct 2019

HP Inc

SASE: Explore the Emerging Technology
sponsored by TechTarget
RESOURCE: Enterprise networking technologies and architectures are evolving quickly and Secure Access Service Edge (SASE) is climbing up in the hype cycle. Although we don't expect you to be investing in SASE today, you need to understand what it is. After completing our WAN survey, unlock access to our new guide to learn everything you need to know.
Posted: 09 Sep 2020 | Published: 10 Sep 2020

TechTarget

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Cybereason EDR
sponsored by Cybereason
DATA SHEET: Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

Remote Education: Prepping for the Long Game
sponsored by Comcast Business
RESOURCE: According to the UN, more than 850 million students worldwide have been forced out of the classroom due to COVID-19, and many can no longer participate in school as a result. Action must be taken to ensure that students will be back in the classroom, virtually or not. Read this blog to learn how to prepare your network for the future of learning.
Posted: 11 Sep 2020 | Published: 20 May 2020

Comcast Business

5 Manufacturing Case Studies
sponsored by Cato Networks
CASE STUDY: The high cost and rigidity of MPLS are driving WAN transformation in the manufacturing arena. Using SASE architecture, enterprises may be able to benefit from the convergence of SD-WAN capabilities and a full network security stack, which can improve network performance overall. Open to read 5 SASE case studies for manufacturing.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cato Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info