IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed   
PDD 63 Reports
 
Modernize DevOps with CyberArk Secrets Management and Red Hat OpenShift
sponsored by Red Hat
WEBCAST: No organization wants to be the next security breach headline in the news. However, many organizations still haven’t prioritized security enough to ensure a breach doesn’t happen. In this resource, explore how your organization can stay secure with the right DevSecOps flow, so that the only headlines about your team are positive ones.
Posted: 13 Apr 2021 | Premiered: Apr 13, 2021

TOPICS:  Security
Red Hat

Tanium's Star Set To Rise On The European Market
sponsored by Tanium
ANALYST REPORT: This Vendor Profile, written by IDC, looks at the development of Tanium with a specific focus on its expanding presence in Europe, as well as the development of its solutions portfolio. Download this report to learn more.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TOPICS:  Security
Tanium

Transforming Security In The World Of Digital Transformation
sponsored by VMware International Unlimited Company
EBOOK: Meet the Boss has partnered up with VMware Carbon Black to host a series of virtual roundtable sessions with security executives to explore how they are approaching security challenges at their respective organizations- read on for their stories.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

VMware International Unlimited Company

Digital Transformation For A Post-2020 World
sponsored by Hyland
EBOOK: The results are in: The top strategic business priority in the post-pandemic environment is digital transformation. But what does the new normal of digital transformation look like? According to Hyland, a calculated shift to a low-code platform. Open up this eBook to learn more.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

TOPICS:  IT Management
Hyland

Infrastructure Monitoring 101 The Power To Predict And Prevent
sponsored by Splunk
EBOOK: Download Infrastructure Monitoring 101: The Power to Predict and Prevent to learn how complex IT infrastructures create opportunities for failure, the benefits of observability in IT operations, how an infrastructure monitoring practice benefits other teams and more.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  IT Management
Splunk

Boosting Expertise in Clinical Engineering atTRIMEDX
sponsored by CyberVista
CASE STUDY: TRIMEDX, a global leader in clinical asset management in healthcare, needed a cybersecurity training program for a clinical engineering workforce of more than 3,100 team members. Download this case study to learn how their partnership with CyberVista helped them prepare employees for the worst that threat actors have to offer.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

CyberVista

Review hybrid cloud management tools from Google, Azure, AWS, and more
sponsored by Techtarget
RESOURCE: Plenty of organizations are already using hybrid cloud strategies, but cloud management tools and strategies can oftentimes be more complex than they need to be. Open up this E-Book to explore hybrid cloud management tools from Google, AWS, Azure, and more.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Techtarget

The Changing Dynamics of AppSec, and Key Lessons You Can Learn
sponsored by Synopsys
WEBCAST: AppSec is continually evolving as new technologies come to the fore. In this resource, analyse some key recent trends in AppSec as well as the emerging activities that organizations are doing to protect themselves and their data.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

TOPICS:  Security
Synopsys

TOP 50 Security Threats
sponsored by Splunk
EBOOK: Download this e-book for the top 50 security threats from A-Z. All 106 pages will tell you what you need to know about each threat, how the attack happens, and where it comes from.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

TOPICS:  Security
Splunk

Palo Alto Networks IoT Cybersecurity Report
sponsored by Palo Alto Networks
ANALYST REPORT: Read this 451 Business Impact Brief to learn why an agent-based security approach isn't the answer – and why an agentless approach is – when it comes to IoT security.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

TOPICS:  Security
Palo Alto Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences