IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed   
Perimeter Security Reports
 
Corelight Sensor: A Typical Use Case
sponsored by CoreLight
BROCHURE: Faced with constant alerts from various security devices (IDS, anti-malware, anti-spam, etc.) today's companies still suffer from theft, false positives, and a general lack of visibility into network traffic. Download this white paper to learn about a network monitoring product that can help you quickly get to the bottom of threats.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
CoreLight

The Perimeter is Dead. Long Live the Perimeter.
sponsored by Symantec
RESOURCE: The traditional network perimeter is vanishing and so is the security built into that perimeter. In order to stay secure in today's cloud generation workforce, organizations need a better way to extend their security controls while still supporting anytime and anywhere access. In this infographic, learn 5 tips for securing your network.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

2019 Report: State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT: Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

TOPICS: 
Proofpoint

Four Easy Ways Central Logging Improves Security Posture
sponsored by Splunk Services UK Ltd
WHITE PAPER: Cybersecurity tools send alerts to help identify malicious activity, but the burden remains with the organization to figure out whether that alert is meaningful and if and how it fits into a larger chain of malicious activity. In this white paper, explore 4 basic data sources that you can leverage for immediate visibility of security activities.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

TOPICS: 
Splunk Services UK Ltd

Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

TOPICS: 
Arxan

Securing Applications in the Cloud
sponsored by Cloudflare
WHITE PAPER: In this white paper, explore a network security tool designed to help you remain secure and 'always-on' by providing intelligent security at scale, and layered defenses to protect against DDoS, data theft and malicious bots.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

TOPICS: 
Cloudflare

The IT Security Confidant Vanishing Perimeter Pickup Sub
sponsored by Symantec
WEBCAST: See the benefits of Symantec Web Security Services today.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
Symantec

5 Things You Can Do by Adding a Layer of Cloud-Delivered Protection
sponsored by Cisco Meraki
RESOURCE: In this white paper, find out how you can deliver a 100% cloud-delivered secure internet gateway that provides a line of defense against threats on the Internet, and explore 5 things you can do by adding a layer of cloud-delivered protection.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

TOPICS: 
Cisco Meraki

The IT Security Confidant Vanishing Perimeter Sub
sponsored by Symantec
WEBCAST: The world of IT security has seen a vanishing perimeter in recent years. This has resulted from the increased usage of cloud which has made it for difficult for companies to secure mobile devices. In this webcast, learn about a simple, complete and cost-effective cloud security solution from Symantec.
Posted: 31 Jan 2019 | Premiered: Jan 31, 2019

TOPICS: 
Symantec

Network Visibility and Using "Bro" with Vincent Stoffer
sponsored by CoreLight
WEBCAST: Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
CoreLight
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement