Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed   
Network Security Software Reports
1 - 25 of 399 Matches Previous Page  |  Next Page
Email Security Threats: How to Protect Your Business, People and Data
sponsored by Barracuda
WEBCAST: Every organization is challenged by email security. Rogue actors are increasingly using email to target employees and system administrators using a growing range of threats and techniques – and detection has become more difficult as a result. Stay up to date by viewing this webcast on the latest email security threats and how to defend from them.
Posted: 29 Sep 2020 | Premiered: Sep 29, 2020

Barracuda

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion costly in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Analyst Report: WAN Edge Infrastructure
sponsored by Fortinet, Inc.
ANALYST REPORT: Gartner defines the WAN edge infrastructure market as WAN edge products that provide network connectivity from distributed enterprise locations to access resources in private and public data centers, as well as IaaS and SaaS. In this Magic Quadrant, explore key vendors in the space and see how they stack up again each other.
Posted: 29 Sep 2020 | Published: 23 Sep 2020

Fortinet, Inc.

Cybersecurity Risk: A Board’s-Eye View Chapter 4
sponsored by PortSys
WHITE PAPER: Access control is now the single most important aspect of an organization’s security architecture. What if you could view the context of a user’s access request, then have that request analyzed against your security policies for authentication? Read this brief to look at Total Access Control by PortSys.
Posted: 29 Sep 2020 | Published: 01 Aug 2020

PortSys

Webinar: Expert Advice for Integrating a 4G LTE Out-of-Band Network
sponsored by Vertiv
WEBCAST: Disruption is a significant contributor to the deterioration of an organization’s ability to operate at peak efficiency. Therefore, IT organizations need to build a resiliency plan to help mitigate those disruptions. In this webinar, learn how the latest out-of-band technologies can deliver 24/7 access even when your network goes down.
Posted: 29 Sep 2020 | Premiered: Sep 29, 2020

Vertiv

COVID-19 Challenges for the Borderless Enterprise
sponsored by Infoblox
ANALYST REPORT: Prior to the COVID-19 crisis, only 21% of organizations globally had over half of their workforce working remotely. However, the COVID-19 crisis has forced companies to become “borderless,” pushing these numbers up. Download this research report to uncover more key findings from a recent survey on COVID-19 challenges for the borderless enterprise.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Infoblox

Single Sign-On Without the Complexity
sponsored by Citrix
EBOOK: An improperly managed SSO forces organizations to implement several access solutions from different vendors to cover their application landscape. In doing so, any productivity and user experience benefits are wiped out, zero trust becomes more difficult and costs go up. Take control of security – read this e-book on Citrix Workspace SSO.
Posted: 28 Sep 2020 | Published: 20 Aug 2020

Citrix

Cybersecurity Risk: A Board’s-Eye View Chapter 3
sponsored by PortSys
EBOOK: The zero trust market is becoming saturated, and organizations considering zero trust are having to do their homework when it comes to vendor selection and fit. For many, substantial factors will be ease of deployment and flexibility, as these will lower costs. Read this short brief to learn about Zero Trust Access by PortSys.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Cybersecurity Risk: A Board’s-Eye View Chapter 2
sponsored by PortSys
EBOOK: When it comes to zero trust architecture, there is no one-size-fits-all package. It’s crucial that you consider which type of zero trust could best suit your organization, especially given the recent spike in vendors boasting zero trust capabilities. Read this short white paper to learn the 3 different flavors of zero trust.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Cybersecurity Risk: A Board’s-Eye View Chapter 1
sponsored by PortSys
EBOOK: IT security is broken – what will it take to fix it? A growing concern across board rooms and C-suites worldwide, security in a changing landscape has drawn more attention to a zero trust ideology. But how do you know if it could work for your enterprise? Jump into these 5 critical security questions to give your posture some consideration.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

The Role of DDI in SASE Deployments
sponsored by Infoblox
ANALYST REPORT: The need to re-architect the network has given rise to a flurry of software-defined deployments, but these have proven to bring management and security challenges. However, a new market has recently emerged that tightly couples security with the network: the Secure Access Service Edge (SASE). Download this research report to learn more about SASE.
Posted: 28 Sep 2020 | Published: 31 Aug 2020

Infoblox

Leveraging Public Cloud to Operationalize Security While Confronting Today’s Workplace Realities
sponsored by Splunk
WHITE PAPER: With the amount of people now working from home, it stands to reason that organizations are searching for ways to amplify their security in a way that is manageable. Cloud-based security may be the answer. Read this custom white paper to learn about the benefits of security through the cloud and how they align with the future.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

Splunk

Definitive Guide to Moving Target Defense for Automated Bot Attacks
sponsored by BotRX
WHITE PAPER: As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

BotRX

Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys

PortSys: Zero Trust e-book
sponsored by PortSys
EBOOK: Zero trust is gaining popularity due to its flexible approach to enterprise protection. According to the International Data Group, 52% of companies are researching or piloting a zero-trust model. If you’re considering a model of your own, read these 5 security questions to learn where you stand, and to see where you could benefit from zero trust.
Posted: 25 Sep 2020 | Published: 01 Aug 2020

PortSys

Product Brief: Endpoint Agent
sponsored by Sinefa
WHITE PAPER: Security managers and professionals need endpoint monitoring that allows them to gain actionable insights into end user experience and troubleshoot problems. Most of all, these professionals need visibility over their networks so that they can work to optimize performance. Read this white paper to learn about Sinefa’s Endpoint Agent.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Sinefa

Secure SD-WAN: The Launch Pad Into Cloud Video
sponsored by Barracuda
WEBCAST: If your organization is considering secure SD-WAN, then there is much to take into consideration. Why does your organization need it? How could it help your network evolve and reach new heights? What about the public cloud? Watch this informative webcast, which includes global survey results about SD-WAN adoption and securing cloud workloads.
Posted: 23 Sep 2020 | Premiered: Sep 23, 2020

Barracuda

Phishing Attacks Advanced Techniques That Evade Detection
sponsored by Vade Secure
WHITE PAPER: The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Email Security for Microsoft 365
sponsored by Vade Secure
WHITE PAPER: Cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. You may have enabled email security add-ons for Microsoft 365, but you’re not as safe as you think. Read this white paper to learn how to keep your email safe from phishing, spear phishing and zero-day attacks.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Spear Phishing: The Targeted Attacks that Aim for Your Business
sponsored by Vade Secure
WHITE PAPER: Phishing and spear phishing are two of the most common types of cyberattacks. In a growing digital economy, technological assets are coming under greater threat from these two very similar attacks. How do you identify a phishing attack, and how can you take a proactive approach? Read this white paper to learn the answers.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


Boys & Girls Clubs of Puerto Rico Protects Microsoft 365 Users from Targeted Attacks While Improving Performance
sponsored by Vade Secure
CASE STUDY: The Boys & Girls Clubs of Puerto Rico needed a way to secure their Microsoft 365 platforms while receiving quicker responses from their helpdesk. Confronted with a rise in phishing, spear phishing and malware attacks, they needed to act fast. Jump into the case study to look up-close at how they solved their problem.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


Securing the Remote Revolution
sponsored by AWS & CrowdStrike
EBOOK: Protecting modern remote workforces requires security capabilities that go beyond traditional approaches. This e-book provides an overview of the emerging adversary tactics targeting remote workforces and highlights new and effective cybersecurity strategies for a fully remote world – read on to get started.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

AWS & CrowdStrike

Costs of the Status Quo for Multi-Location Businesses
sponsored by Frontier Communications
RESOURCE: Urgency is rising for multilocation businesses to put bandwidth under the microscope.Unfortunately, triaging remote workforce support requests and managing multiple network vendors can make it difficult for overburdened IT leaders to know where to start their bandwidth reassessment. Download this guide to learn how to get started.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Frontier Communications

How to secure and automate branch office connectivity to AWS with Cisco SD-WAN
sponsored by Cisco & AWS
WEBCAST: Watch this webinar to learn how international energy provider ENGIE is leveraging Cisco SD-WAN on AWS to establish secure, automated connectivity between their branch locations and cloud workloads.
Posted: 17 Sep 2020 | Premiered: Sep 2, 2020

Cisco & AWS

Securosis: Network Operations and Security Professionals' Guide to Managing Public Cloud Journeys
sponsored by Gigamon
WHITE PAPER: Your cloud journey is unique, but a new guide shows there are common patterns that steer you to the best approach for a successful outcome. Learn which cloud adoption pattern your organization aligns with, key risks, recommendations and important questions to ask yourself at each stage of your journey.
Posted: 16 Sep 2020 | Published: 01 Mar 2020

Gigamon
1 - 25 of 399 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info