Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

PGP

RSS Feed   
PGP Reports
 
Keeping Users Safe from Advanced Threats and Unsolicited Content
sponsored by Barracuda Networks
PRODUCT OVERVIEW: How can you stop advanced malware from breaching your network perimeter and stealing your valuable data? The following paper explains how to confront—and thwart—these threats using a cloud-based firewall that combines multiple layers of detection for all threat vectors with on-the-fly sandbox execution of unknown files.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Critical Components of Continuous Testing
sponsored by TechTarget
RESOURCE: Getting testing done quickly and efficiently is now the most significant obstacle most organizations face when trying to get software out the door quickly. There are actually 4 key components to have in place when using continuous testing. Open this guide to learn all 4.
Posted: 04 Jul 2018 | Published: 12 Jun 2019

TechTarget

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

Understanding and Preventing Finance Phishing Fraud
sponsored by Barracuda
WEBCAST: Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.
Posted: 24 May 2019 | Premiered: May 24, 2019

Barracuda

Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
WHITE PAPER: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Splunk

Application security: More important than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

ComputerWeekly.com

Okta + Shape: Stopping Identity Attacks in their Tracks
sponsored by Shape Security
VIDEO: In this short video, learn how Okta and Shape Security partnered up to offer a comprehensive identity-first security strategy that aimed to prevent both automated and targeted identity attacks.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Shape Security

Informatica Eliminates SSH Key Management with Aporeto Cloud PAM on AWS
sponsored by Aporeto
CASE STUDY: In this case study, dive into the benefits and solutions that Informatica received when utilizing Aporeto’s Cloud PAM to provide them with comprehensive visibility and better control over their sprawling environment.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Aporeto

Business Case for Web Isolation
sponsored by Menlo Security
WHITE PAPER: As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
EBOOK: The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.
 
Browse by Report Type:
PGP White Papers | PGP Multimedia | PGP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement