IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed   
PDD 63 Reports
 
Application security: best practices and risks
sponsored by ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

ComputerWeekly.com

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Detect On-Prem Privileged Account Risk and Vulnerabilities with Cyberark Zbang
sponsored by CyberArk Software, Inc
DATA SHEET: In this brief, learn about the capabilities of the CyberArk zBang tool and how it creates an in-depth risk assessment that automates and unifies manual scans that uncover privileged access security risk across on-premises environments.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

CyberArk Software, Inc

The Total Economic Impact of Atlassian for ITSM
sponsored by Atlassian
ANALYST BRIEF: Inside this economic impact analysis from Forrester, discover how leading IT analysts have quantified Atlassian’s Jira Service Desk platform and its impact on real-world IT service management strategies.
Posted: 11 Oct 2019 | Published: 30 Jun 2019

Atlassian

Architecting End User Computing Solutions
sponsored by Nutanix
WHITE PAPER: What are the possible infrastructures at your disposal that will streamline and simplify EUC project completion? Download this e-book to view several options for VDI and EUC environments, and to learn how to implement them in your organization, such as converged infrastructure, hyper-converged infrastructure, and more.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Nutanix

Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

5 Best Practices in Cloud Security for Legal
sponsored by ShieldX
WHITE PAPER: Everyone is moving to the cloud. But unfortunately, cloud adoption is moving too fast for security to keep up. This e-book outlines a series of best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud. Read on for 5 best practices these customers have shared.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ShieldX

An Analysis of the Market for Data Loss Prevention Vendors
sponsored by Forcepoint
ANALYST REPORT: Tap into this analysis of the market for data loss prevention solutions that reveals top players, trail blazers, specialists and mature players.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Barracuda

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement