Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Network Security Spending

RSS Feed   
Network Security Spending Reports
 
Keeping Remote Workers Safe and Your Work Secure
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

Protecting Healthcare Data With Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: Healthcare professionals are facing the growing challenge of balancing the security of patient data with ease of authorized access. Read this case study to see how one healthcare institution was able to achieve effective data management across various devices without sacrificing functionality.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

A Guide To Mitigating Risk of Insider Threats
sponsored by Microsoft
RESOURCE: Insider threats have been a growing issue – both in terms of volume and cost – made even more disruptive thanks to the 2020 pandemic. This article provides a comprehensive guide to managing insider threats in the remote work era – read on to get started.
Posted: 16 Dec 2020 | Published: 16 Dec 2020

Microsoft

The Neo-Security Architecture
sponsored by Curity AB
WHITE PAPER: The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Curity AB

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

Case Study: Lee Company
sponsored by Clearedin
CASE STUDY: In this case study, discover how Lee Company, a construction and building services firm, was able to improve their email, cloud and collaboration security capabilities through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Okta + Netskope + CrowdStrike + Proofpoint: Securely Enable Remote Work at Scale
sponsored by Okta
DATA SHEET: Security and access challenges have been magnified by the massive global shift towards remote work. Read this data sheet to see how Okta, Netskope, Crowdstrike and Proofpoint (also known as the Spectra Alliance) combine their efforts to enable organizations to securely enable remote work at scale.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

BlackBerry Cyber: Video
sponsored by BlackBerry
VIDEO: According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.
Posted: 30 Dec 2020 | Premiered: 30 Dec 2020

BlackBerry

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are on the rise – both in terms of frequency and average cost per attack. This white paper provides a comprehensive look into how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoints for the strongest protection possible – read on to get started.
Posted: 11 Jan 2021 | Published: 31 Jul 2020

Sophos

Innovation Insight For Extended Detection And Response
sponsored by Palo Alto Cortex
RESEARCH CONTENT: Disparate risk management teams and security tools make it difficult to efficiently mitigate threats. This Gartner report highlights the risks and advantages of today’s leading extended detect and response (XDR) tools – designed to unify incident detection and response efforts into a single platform.
Posted: 04 Jan 2021 | Published: 19 Mar 2020

Palo Alto Cortex
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info