IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed   
PDD 63 Reports
 
Security Orchestration, Automation and Response (SOAR) Buyer's Guide
sponsored by Swimlane
WHITE PAPER: In today's complex computing environments, it can be hard to determine what actual security coverage is in place. Finding skilled security analysts is an increasingly difficult task. Each year as threats grow, CISOs must do more with less. A SOAR solution can help simplify, automate and document the incident response process.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Swimlane

How a Modern IT Infrastructure Helps Organizations Grow
sponsored by Citrix
WHITE PAPER: Explore the impact that a modernized IT infrastructure can have on business growth, and find out how IT executives are tackling major pain points that often accompany an out-of-date, lackluster infrastructure.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Citrix

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service
sponsored by Arctic Wolf
VIDEO: SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

Merge Old and New IT with Converged Infrastructure
sponsored by Pure Storage
RESOURCE: You'll learn how to use converged infrastructure to meld old and new IT investments if you keep reading the following custom article—enabling your teams to use tools and processes they are already familiar with, to consolidate at your own pace, and to eliminate unnecessary silos.
Posted: 12 Dec 2018 | Published: 12 Dec 2018

Pure Storage

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Gain Visibility into Assets and Vulnerabilities Across Any Environment
sponsored by Alert Logic
RESOURCE: Learn how you can gain visibility into your environments (cloud, on-premises, or hybrid), and identify the remediation steps required to eliminate exposures.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

Alert Logic

UKtech50 2018: The 50 most influential people in UK IT
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

ComputerWeekly.com

Deeper Security Coverage for Any Environment
sponsored by Alert Logic
RESOURCE: When alerts and incidents coming in are at an all-time high, IT teams looks for additional security options to help. In this resource, learn how to block malicious web traffic, reduce false positives, conduct threat analysis, and more.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

Alert Logic

CEO Insights - Cybersecurity Predictions for 2019
sponsored by Arctic Wolf
VIDEO: Cybercriminals continued on their rampage in 2018 hacking into name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down in 2019. In this webcast, Brian NeSmith walks through the top cybersecurity predictions for 2019 and what organizations can do to best prepare for them.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement