IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed   
Network Threats Reports
 
Today's State of Vulnerability Response: Patch Work Demands Attention
sponsored by ServiceNow
RESEARCH CONTENT: As hackers ramp up their attacks and turn to advanced technologies such as artificial intelligence, it is essential that cybersecurity teams keep pace, fending off attacks and keeping sensitive data secure. In this research report, find a pragmatic roadmap for reducing data breaches.
Posted: 04 Feb 2019 | Published: 04 Feb 2019

TOPICS: 
ServiceNow

Power of the Threat Detection Trinity
sponsored by Micro Focus
WHITE PAPER: Today, SOCs face mounting challenges as the advanced threat landscape continues to evolve. Compounding the challenge of advanced threats is the explosion of data and lack of skilled security personnel. In this white paper, learn how you can best combine real-time correlation, insider threat analysis and hunting to protect against cyberthreats.
Posted: 04 Feb 2019 | Published: 31 Jan 2019

TOPICS: 
Micro Focus

Four Steps to Developing a World-Class Security Program
sponsored by Dell SecureWorks
WHITE PAPER: A reactive security approach is all too common, even though the question is not if a company will suffer an incident but when. By adopting a proactive stance, organizations minimize the likelihood of suffering a breach. In this white paper, discover 4 steps to developing a world-class security program.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Dell SecureWorks

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy in the 2018 State of Cybercrime report.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Dell SecureWorks

The IT Security Confidant Vanishing Perimeter Pickup
sponsored by Symantec
VIDEO: See the benefits of Symantec Web Security Services today.
Posted: 31 Jan 2019 | Premiered: 31 Jan 2019

TOPICS: 
Symantec

The Perimeter is Dead. Long Live the Perimeter.
sponsored by Symantec
RESOURCE: The traditional network perimeter is vanishing and so is the security built into that perimeter. In order to stay secure in today's cloud generation workforce, organizations need a better way to extend their security controls while still supporting anytime and anywhere access. In this infographic, learn 5 tips for securing your network.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell EMC
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell EMC

Implementing Agile Security Response
sponsored by ServiceNow
WHITE PAPER: Data breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.
Posted: 04 Feb 2019 | Published: 30 Sep 2018

TOPICS: 
ServiceNow

Eliminating the Blind Spot
sponsored by Dell SecureWorks
WHITE PAPER: Today, enterprises must obtain end-to-end visibility, detection and response capabilities required to quickly remediate breaches. In this white paper, learn how unifying advanced detection technologies for the network and endpoint with the right intelligence, people and processes can empower a security team.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Dell SecureWorks

CloudSOC and Email Security.cloud for Microsoft Office 365
sponsored by Symantec
RESOURCE: Keep your Office 365 safe with Symantec security solutions for email, file sharing, and collaborative apps. With Symantec CloudSOC and Email Security.cloud, you can secure your email and apps against threats, protect your data and gain control over your accounts. Download this resource to gain a better understanding of Symantec solutions.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement