Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

PGP

RSS Feed   
PGP Reports
 
The Total Economic Impact™ Of ServiceNow Security Operations
sponsored by ServiceNow
ANALYST REPORT: With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.
Posted: 12 Feb 2021 | Published: 30 Oct 2020

ServiceNow

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

SIG - SASE in 15 minutes
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Axis Security Video
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

The Fundamental Guide To Building A Better Soc
sponsored by Splunk
RESOURCE: There simply isn’t enough skilled security talent out there, and that which does exist is expensive. So what are companies who rely on dinosaur technology to do? They need to start building a next generation, modern SOC, today. Download your complimentary copy of The Fundamental Guide to Building a Better Security Operation Center (SOC) today.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Splunk

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Text Message and Social Media Compliance Best Practices for Law Enforcement Agencies
sponsored by Smarsh
WHITE PAPER: The popularity of workplace SMS/text messaging and social media has exploded in recent years. Because of this, law enforcement needs to be aware of certain guidelines and considerations when allowing officers and agency employees to use these communication tools. Use this guide to learn how to stay SMS and social media compliant.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Smarsh

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

Platform Security For The ASEAN Market
sponsored by Datto
WHITE PAPER: As ransomware, cyberattacks, phishing and other forms of malware are becoming increasingly dangerous, it’s important to select a security approach that can guarantee data protection and recovery. Read on to learn why platform security is a cornerstone of effective cyber resilience strategies around the world for many reasons.
Posted: 02 Aug 2021 | Published: 02 Aug 2021

Datto
 
Browse by Report Type:
PGP White Papers | PGP Multimedia | PGP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences