Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed   
Network Security Software Reports
1 - 25 of 317 Matches Previous Page  |  Next Page
Continuous Authentication as the Zero Trust Multiplier
sponsored by BlackBerry
RESOURCE: The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.
Posted: 10 Jul 2020 | Published: 14 May 2020

BlackBerry

Key Cyber Security ‘Windows’ You Need to Close
sponsored by Verizon
RESOURCE: Just as small businesses often don't appreciate their overall cyber risk profile, they typically don't grasp exactly how cybercriminals are breaching their data stores through malware.This article indicates exactly which measures must be taken to effectively defend from cybersecurity threats.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

10 Best Practices for Internet Security
sponsored by Verizon
RESOURCE: Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

How Next-Gen Networking Technologies Improve Security
sponsored by Verizon
WEBCAST: 69% of organizations claim that their network management team finds it challenging to balance availability and security. Additionally, data security improvement is reported to be most important among network strategists. This webcast may help you to stay ahead of the curve. Topics include security awareness, business continuity, and SD-WAN.
Posted: 09 Jul 2020 | Premiered: Jul 9, 2020

Verizon

Securing the New Normal: A Virtual Happy Hour on Moving Forward
sponsored by RSA Conference
WEBCAST: In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.
Posted: 08 Jul 2020 | Premiered: Apr 7, 2020

RSA Conference

An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context
sponsored by Delve
WHITE PAPER: To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky Lab
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky Lab

BlackBerry AI Powered Zero Trust
sponsored by BlackBerry
WEBCAST: Endpoint security affects all aspects of an organization, not least when workforces are remote.To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner?This webcast presents models that organizations can use.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

BlackBerry

What Characterizes the Best Content Delivery Network (CDN)?
sponsored by Limelight Networks, Inc.
WHITE PAPER: There is no doubt that choosing your content delivery network (CDN) provider is a key decision for your business. In white paper, uncover insights to help you choose your CDN according to the specific technical capabilities and commercial conditions available in the market.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Limelight Networks, Inc.

How to Select the Right CDN For Today’s Video Delivery Needs
sponsored by Limelight Networks, Inc.
WHITE PAPER: In 2020, it’s business as [un]usual which means the need for online video is greater than ever before. To provide the best possible streaming video experience, many organizations engage the services of a CDN. In this white paper, explore a checklist to help you select the right CDN for today’s video delivery needs.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Limelight Networks, Inc.

Summer School Gone Virtual? How to Keep Virtual Activities Safe for Students
sponsored by Cisco Umbrella
WEBCAST: Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.
Posted: 01 Jul 2020 | Premiered: May 18, 2020

Cisco Umbrella

Student Cybersecurity 101
sponsored by Cisco Umbrella
EBOOK: Today’s schools face more security threats than ever before. Sensitive information is at stake, and school districts search for the best ways to protect their students. Through adoption of cloud technologies from Cisco, you can get your security back on track and shift focus back to education. Dive into this e-book to take a closer look.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Cisco Umbrella

Network Independent Encryption: Flexible, Policy-Based Network Encryption Security for Today’s High-Performance Network Architectures
sponsored by Thales
WHITE PAPER: Thales is a global leader in the development of end-to-end encryption technologies. Their solutions protect sensitive data for a wide range of commercial, government, industrial and defense customers. Read this white paper to learn more about Network Independent Encryption, the basis of a new technology by Thales called Transport Independent Mode.
Posted: 30 Jun 2020 | Published: 30 Apr 2020

Thales

The State of Zero Trust Security in Global Organisations
sponsored by Okta
ANALYST REPORT: If your organisation is looking to implement a zero-trust security model to one or more parts of your network, then this Okta report is a must-read.Zero trust is beginning to take shape across the globe, and this report reveals details as to where it is being implemented, the industries that are implementing it, and how to build a zero-trust stack.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

Okta

Transitioning Network Security Controls to the Cloud
sponsored by Cisco Umbrella
ANALYST REPORT: Where does IT in North America stand when it comes to moving network security to the cloud? ESG surveyed 376 IT and cybersecurity professionals at organizations in the US and Canada responsible for evaluating, purchasing, and managing network security technology products and services. Read the full report to observe why attitudes may be shifting.
Posted: 30 Jun 2020 | Published: 31 May 2020

Cisco Umbrella

Nitro CBRS Private Broadband Support Video Networks
sponsored by Motorola, Inc.
WHITE PAPER: More and more businesses across the country are turning to video security and analytics to help manage critical operations. However, your video security solution is only as good as the network supporting it. In this white paper, learn how Citizens Broadband Radio Service (CBRS) can help to support your business’ growing video needs.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

Motorola, Inc.

The Maturity of Zero Trust in Europe
sponsored by Okta
RESOURCE: While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Transforming Detection and Response: A SANS Review of Cortex XDR
sponsored by Palo Alto Networks
ANALYST REPORT: Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.
Posted: 29 Jun 2020 | Published: 30 Apr 2020

Palo Alto Networks

Businesses at Work (from Home) 2020 Edition
sponsored by Okta
ANALYST REPORT: Organization around the world have reacted to the pandemic quickly, rolling out remote communication apps, extending VPNs, and adding MFA to ensure the productivity, connectivity, and security of their (now) remote workforces. In this report, 2020 Business at Work (from Home), take a closer look at the fastest growing apps and tools.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

2020: The State of Endpoint Resilience Report
sponsored by Absolute Software Corporation
ANALYST REPORT: In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Absolute Software Corporation

Identity as a Service for Dummies
sponsored by Okta
EGUIDE: According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

The Cisco Umbrella Advantage
sponsored by Cisco Umbrella
EBOOK: Today, the network perimeter is expanding and blurring. Remote workers are bypassing the VPN and data is bypassing perimeter security. Traditional security just can’t keep up. In this e-book, learn how Cisco Umbrella DNS-layer security can help you see and block threats before they ever reach your network or endpoints.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Cisco Umbrella

Osterman Research: Focusing on the Endpoint as a Key Element of Your Security Infrastructure
sponsored by Trend Micro
WHITE PAPER: In the past, endpoints sat behind a network perimeter, but the growth of remote access to corporate resources makes the endpoint the new perimeter. Phishing, ransomware, malware, and web downloads are all potential threats. Delve into this Osterman Research report to get an in-depth look at these threats and how you can protect against them.
Posted: 26 Jun 2020 | Published: 30 Apr 2020

Trend Micro

Insider Threat Management - Securing the Remote Worker and Enabling Business Continuity
sponsored by Proofpoint
DATA SHEET: In this brief, learn how a people-centric Insider Threat Management solution can help provide the necessary context around user and data activity to protect against costly data loss, system misuse and/or brand damage that can be caused by remote insiders.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Proofpoint

2020 Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: This annual Trustwave Global Security Report provides a comprehensive look at the methods and techniques used by cybercriminals in order to provide valuable insight into ever-changing threat landscape. Download this report for an in-depth analysis of data compromise, email threats, malware, network security and more.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

SingTel
1 - 25 of 317 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info