IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed   
Perimeter Security Reports
 
Cybersecurity Insights Report Ninth Edition
sponsored by AT&T Cybersecurity
RESOURCE: 5G is more than just an increase in speed; its rollout is expected to change the way organizations approach network and technology security. A recent study was conducted to uncover the potential impacts of 5G and the preparedness of enterprises. Read on to uncover the key insights from the research.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

AT&T Cybersecurity

Preparing for a Data Breach: Not If, But When
sponsored by A-Lign
WHITE PAPER: When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

A-Lign

WAN Edge Infrastructure
sponsored by Silver Peak
ANALYST REPORT: WAN Edge Infrastructure now incorporates a broader set of network functions, including traditional routing, security, SD-WAN, and WAN optimization. In this Gartner Magic Quadrant, explore an evaluation of platforms available for the WAN edge and key insights into the Leaders, Challengers, Visionaries and Niche players.
Posted: 09 Dec 2019 | Published: 26 Nov 2019

Silver Peak

Magic Quadrant for Managed Security Services, Worldwide
sponsored by Alert Logic
RESOURCE: Managed security services (MSSs) enable organizations to outsource certain tasks to ensure security events are being monitored 24/7. In this Gartner Magic Quadrant report, go in-depth into the key MSS providers to identify those best aligned to the needs of your organization.
Posted: 15 Jan 2020 | Published: 02 May 2019

Alert Logic

Making MITRE ATT&CK Actionable
sponsored by ThreatQuotient
WEBCAST: In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

Network Security Best Practices
sponsored by Netwrix Corporation
WHITE PAPER: While ensuring the security of your network is a critical task, the amount of tactics and technologies that exist to support this effort can seem overwhelming. This white paper breaks down the basic aspects, tactics, and best practices related to network security in order to help guide your IT security team. Read on to get started.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Netwrix Corporation

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

A Unified Wired and Wireless Access Edge
sponsored by Cisco
ANALYST REPORT: A critical step in the journey to becoming a digital business is becoming an agile organization. The challenge is that an organization can only be as agile as its least agile IT component, which today is the network—particularly the access edge. In this research report, learn how organizations can change this by implementing a unified edge.
Posted: 09 Jan 2020 | Published: 28 Feb 2019

Cisco

Avenue Stores Blocks ATO and Scraping with PerimeterX Bot Defender
sponsored by PerimeterX
CASE STUDY: In this case study, discover how Avenue Stores, a leader in plus size fashion, collaborated with PerimeterX to address malicious bot activity they were experiencing including ATO, web scraping, and card fraud.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

PerimeterX

Business Email Compromise: The Catalyst for Mailbox Level Email Security
sponsored by Ironscales
WHITE PAPER: As phishing attack grow in sophistication, organizations must establish security protocols to meet these evolving threats. One emerging threat is business email compromise (BEC), which affects more than 500 businesses per day. In this white paper, go in-depth into BEC, what makes it so successful and how organizations can mitigate the risks.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Ironscales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info