IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed   
Perimeter Security Reports
Wire Transfer Guard: Harnessing Distribution Deception to Prevent Cyber Fraud
sponsored by Illusive Networks
CASE STUDY: This resource highlights how early network visibility and insight allows defenders to secure the time they need to analyze the adversary and take appropriate action when protecting financial transfers.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Illusive Networks

Making Risk Management More Effective With Security Ratings
sponsored by BitSight
WHITE PAPER: With the growth and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of most significant risks that organizations face. This resource offers 3 risk management approaches organizations have taken to effectively improve their security.
Posted: 07 Feb 2018 | Published: 07 Feb 2018


Deception Technology Comes of Age
sponsored by Illusive Networks
WHITE PAPER: Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Illusive Networks

WAF and DDoS: Perfect Bedfellows
sponsored by Radware
RESOURCE: This resource explains how DDoS and WAF strategies should be integrated together to improve attack mitigation capabilities while maintaining customer expectation.
Posted: 23 Feb 2018 | Published: 23 Feb 2018


Ransomware Defense for Dummies
sponsored by Cisco Umbrella
EBOOK: Based on statistics from Cisco's Talos threat intelligence group, on average, 2.9% of compromised victims in a ransomware attack will pay the ransom. Inside this for Dummies e-book, learn everything you need to know about ransomware attacks as well as best practices to reduce ransomware risks.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Cisco Umbrella

Smart PoE Switches
sponsored by D-Link
EBOOK: Smart Power over Ethernet (PoE) switches are ideal for larger, more complex applications such as IP surveillance networks. This resource highlights 7 reasons your organization should consider upgrading to PoE switches today.
Posted: 13 Feb 2018 | Published: 13 Feb 2018


Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Endpoint Protection & Device Management
sponsored by Seqrite
EGUIDE: The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
Posted: 30 Jan 2018 | Published: 24 Jan 2018


Visibility, Detection and Control for Industrial Networks
sponsored by SecurityMatters
RESOURCE: This resource reveals how to improve network security with strategies such as visibility, threat detection capabilities and control.
Posted: 09 Feb 2018 | Published: 09 Feb 2018


The Cost of Insecure Endpoints
sponsored by Absolute
ANALYST REPORT: According to the Ponemon Institute, just one failed endpoint can cost an organization an average of $612. Explore this Ponemon Institute report to gain insight into insecure endpoints and the excessive costs companies are spending after their endpoints are compromised.
Posted: 29 Jan 2018 | Published: 29 Jan 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement