IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed   
Perimeter Security Reports
 
Enhancing Network Security Through Programmable Networks
sponsored by Windstream Communications
WHITE PAPER: Many legacy networks are hard to defend, with disparate segments and no single management console. For this reason, many businesses are moving to programmable, software-defined networks to provide a foundation for dramatically enhanced security. Discover 4 key takeaways on enhancing your network security through programmable networks.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

Rethinking Data Security with a Risk-adaptive Approach
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.
Posted: 06 Aug 2019 | Published: 30 Apr 2019

Forcepoint

Practical Steps to Take When Implementing Zero Trust
sponsored by TechTarget
RESOURCE: The traditional network perimeter is disappearing, that's why many turn to zero trust. Participate in our multiple-choice survey for a free PDF of our guide Implementing a Zero-Trust Approach to Network Security.
Posted: 13 Jul 2019 | Published: 03 Aug 2019

TechTarget

Cyber Intrusion Services
sponsored by CrowdStrike
WHITE PAPER: In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

How Spear Phishing Targets the C-Suite
sponsored by Inky Technology
RESOURCE: In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Achieving Secure Authentication and Zero-Trust Security Without Agents or Proxies
sponsored by Silverfort
WEBCAST: Silverfort can enable organizations to enforce secure authentication – including MFA, adaptive authentication and zero trust – without deploying software agents or proxies. Tune into this webinar to learn more.
Posted: 15 Jul 2019 | Premiered: Jul 15, 2019

Silverfort

Zero Trust Access Today's IT Security Falls Short
sponsored by PortSys
RESOURCE: 78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

PortSys

5 Best Practices for Managing your Network Security in the Age of Digital Transformation
sponsored by Verizon
RESOURCE: Digital transformation is impacting every industry and it's making network security more important than ever. In this blog, explore 5 things you should consider for your security strategy as you embrace digital transformation, so you can navigate the minefield of evolving threats.
Posted: 29 May 2019 | Published: 24 Oct 2018

Verizon

Build a Strategic Approach to Network and App Security
sponsored by Citrix
EBOOK: In this e-book, discover how an integrated, intelligent approach to security can help you deliver the access, control, and security you need.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

Citrix

5 Signs of Malicious Activity Your Organization May Be Overlooking
sponsored by Farsight Security
RESOURCE: If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Farsight Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement