IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed   
Public Safety Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Episode 3: The Compromise
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how unintentional insider behaviors can lead to credential compromise and wire transfer fraud.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance
sponsored by HackerOne
CASE STUDY: Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Restricting Device Communications to Select Destinations
sponsored by Aeris
PRODUCT OVERVIEW: Gaining security for your IoT devices is a critical step for any deployment, large or small. Keeping your data secure can be business critical. The key to all of this is the ability to restrict device communications only to select web destinations of your choosing. Read on to learn how Aeris ConnectionLock makes this possible.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Aeris

5 Ways to Secure Applications Wherever They Live
sponsored by VMware
RESOURCE: To create a more secure network, companies should consider restructuring their infrastructure in a way that allows all data to be protected regardless of where it sits in the network. Download this infographic to learn how 5 ways VMware can secure your apps wherever they live.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

VMware

Securing Office 365 Email with Isolation
sponsored by Menlo Security
EBOOK: An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Menlo Security

HPE BladeSystem to HPE Synergy Migration
sponsored by HPE and Intel®
EBOOK: This 64-page e-book will help organizations on their journey to composable infrastructure migration. Read on for the highlights, including how composable simplifies hybrid cloud management and 4 migration benefits.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

HPE and Intel®

Using Hyperconverged Infrastructure to Improve Data Protection and Recovery
sponsored by HPE and Intel®
WHITE PAPER: Organizations looking to unbind themselves from the limitations of client/server era technologies should read this IDC white paper. It documents 4 critical considerations for evolving your VM backup strategies and explains how hyper-converged infrastructure (HCI) can improve and simplify data protection and disaster resiliency.
Posted: 05 Jun 2019 | Published: 30 Apr 2019

HPE and Intel®

Application-Centric Security
sponsored by Nutanix
EBOOK: Relying on antiquated methods of protecting IT is no longer feasible. It's time to consider a new application-centric approach that delivers the protection you need with more agility, more flexibility, and above all, better security. Download this e-book to learn how application-centric security can benefit your organization today.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Nutanix

AV Replacement Guide
sponsored by CrowdStrike
WHITE PAPER: Antivirus is virtually universal, so why are so many attacks succeeding? Attackers expect their targets to be running some form of protection and have adapted their tools, techniques and procedures to evade detection. In this white paper, learn the most important elements to consider when replacing an antivirus or endpoint protection solution.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement