Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed   
Resource Access Control Facility Reports
 
Modern Security Solutions for the Mainframe
sponsored by Beta Systems
WHITE PAPER: Jump into this white paper to learn how to identify and plug system security vulnerabilities in your z/OS environments by comparing your current RACF settings to industry standards as defined by Security Technical Implementation Guides.
Posted: 22 Jan 2020 | Published: 22 Jan 2020

Beta Systems

The Evolution of Automation: Unite People and Opportunity for Growth
sponsored by Red Hat
VIDEO: To ensure the productivity and security needs of today’s organizations are being met, IT leaders are embracing the benefits of automation for unifying their people and processes. Watch this webinar for an in-depth look at the Red Hat Ansible automation platform – its key features, capabilities and success stories.
Posted: 24 Jul 2020 | Premiered: 05 Jun 2020

Red Hat

12 Things You Should Do to Stop Ransomware
sponsored by ThreatLocker
WHITE PAPER: To help organizations address some of the commonly overlooked practices (or lack thereof) that can better detect and mitigate ransomware attacks, ThreatLocker compiled a list of practices that highlights 12 things your organization should be doing to stop ransomware attacks. Download now to unlock these 12 necessary practices.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

ThreatLocker

SailPoint Identity Hub: Search, Track & Manage Access
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Achieving HIPAA Compliance with Alcide Kubernetes Security
sponsored by Alcide
WHITE PAPER: The need better security patient PHI in the US led to the inception of HIPAA. The following white paper outlines the key objectives of HIPAA, the challenges of achieving compliance in cloud-native environments, and how to ensure intersectional PHI security between HIPAA and the NIST Cybersecurity Framework.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Alcide

BlackBerry MITRE ATTACK APT29 Evaluation
sponsored by BlackBerry
WHITE PAPER: In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

BlackBerry

Threat Intelligence Report: RSA Conference Edition 2020
sponsored by Mimecast
WHITE PAPER: The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Incorporate Information Protection into Microsoft Teams from the Start
sponsored by Nucleus Cyber
RESOURCE: Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.
Posted: 06 Aug 2020 | Published: 28 May 2020

Nucleus Cyber

Creating Digital Trust: Anchoring Remote Users to Real Identities
sponsored by Onfido
VIDEO: As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.
Posted: 23 Jul 2020 | Premiered: 03 Jun 2020

Onfido

Dynamic Data Protection
sponsored by Forcepoint
PRODUCT OVERVIEW: The following solution brief provides an inside look into Forcepoint Dynamic Data Protection, which combines behavior analytics with data protection capabilities to enable your organization to prioritize high-risk activity and automate policies – ensuring security without sacrificing productivity. Read on for an overview of the key features.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info