Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed   
Resource Access Control Facility Reports
 
Modern Security Solutions for the Mainframe
sponsored by Beta Systems
WHITE PAPER: Jump into this white paper to learn how to identify and plug system security vulnerabilities in your z/OS environments by comparing your current RACF settings to industry standards as defined by Security Technical Implementation Guides.
Posted: 22 Jan 2020 | Published: 22 Jan 2020

Beta Systems

Making It Safe for Your People to Work Remotely
sponsored by Forcepoint
EBOOK: Given the current global pandemic, organizations have had to rapidly enable large amounts of remote workers – without compromising productivity or security. In this eBook, Making It Safe for Your People to Work Remotely, discover the risks associated with remote work and how to effectively address them.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Forcepoint

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT: With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Behavioral Solution for Online Fraud Prevention
sponsored by Buguroo
WHITE PAPER: Buguroo was recently announced as winners of the 2020 Frost & Sullivan Best Practices Award for their innovative behavioral biometrics solution – which looks to help organizations in the banking and financial services industry detect and prevent fraud. Read this report to learn more about Buguroo’s award-winning offering.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Buguroo

Ransomware Prevention and Remediation
sponsored by BlackBerry
PRODUCT OVERVIEW: According to a recent study, 62% of organizations were victimized by ransomware – 58% of which opted to pay the ransom. As this threat vector becomes more lucrative for cybercriminals, expect these numbers to go up. So, what can be done about ransomware? Read this solution brief for BlackBerry’s answer.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

Three Ways PKI Can Help Secure the Remote Workforce
sponsored by Sectigo
EBOOK: IT departments have found themselves under pressure to scale networks to support long-term remote work. With this scale comes a slew of network vulnerabilities that traditional identity management strategies may not be able to handle. View this in-depth e-book to learn 3 ways public key infrastructure can help protect remote workers.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo

The Complete Guide for Preventing Costly Data Leaks for UK Local Governments
sponsored by Zivver
EGUIDE: For local governments in the UK, a data leak can be catastrophic, not to mention expensive. This guide provides a deep dive into the risks that lead to data leaks and what UK councils can do to prevent them from happening.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Zivver

HPE Security Analysis and Roadmap Service
sponsored by TechData
DATA SHEET: In this data sheet, take a closer look at the features, benefits and limitations of HPE’s Security Analysis and Roadmap Service, including the offering’s intended use, customer responsibilities, and more – download now to get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

TechData

How Fortinet Secures AWS Migrations
sponsored by Rackspace
VIDEO: In order to make the most of your organization’s AWS migration, it’s critical to make deliberate considerations when it comes to establishing security measures and assigning security responsibility. Watch this webinar to more and discover how Fortinet can help secure AWS migrations and integrations.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Rackspace

Protecting the User: A Review of Mimecast’s Web Security Service
sponsored by Mimecast
ANALYST REPORT: Web browsers and email clients remain the most common points of entry and attack. Despite security awareness training and increasingly intelligent controls, unsuspecting employees are in the firing line for a bevy of developing cyberthreats. Fight back – view this SANS report to read a review of Mimecast’s Web Security service.
Posted: 20 Oct 2020 | Published: 31 Dec 2019

Mimecast
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info