IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration Reports
 
SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Machine-Learning Automation to Ensure Zero Time to Mitigation
sponsored by Radware
WHITE PAPER: DDoS attack methods are evolving, and traditional protection solutions are ineffective at mitigating the damage dealt by these campaigns. This whitepaper highlights how combining machine learning with existing DDoS prevention tactics can ensure zero-time to mitigation. Read on to learn more.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Radware

Business Infrastructure Control System – BICS
sponsored by Beta Systems
DATA SHEET: Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Beta Systems

Core - DNS - The fastest, easiest way to secure your network
sponsored by Cisco Umbrella
WHITE PAPER: IT leaders are under constant pressure to provide adequate security in an increasingly dangerous world. It can be difficult to sift through the countless security options to find a good fit for your strategy. In this white paper, take a closer look at Cisco Umbrella to determine if it would be a good fit for your team.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Cisco Umbrella

Ransomware Can’t Stop the Presses at La Sentinelle
sponsored by Malwarebytes
CASE STUDY: In this case study, La Sentinelle, a media group in Mauritius, sought to eliminate downtime associated with ransomware in the wake of a disruptive malware attack. Download this white paper to learn how they developed a program that would enable them to identify, mitigate, and prevent malware attacks.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Malwarebytes

The Four Biggest Challenges to Keeping Modern Applications Secure
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

Creating Secure IoT Device Identities
sponsored by Intertrust
WHITE PAPER: The Internet of Things (IoT) is redefining the way business operations are conducted. However, IoT applications are vulnerable to security risks, exposing an organization to threats. The following report highlights the underlying security issues with IoT and outlines ways to potentially mitigate today’s risks. Read on to learn more.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Intertrust

DoorDash: Remote Vendor Access Security Goes Out the Window
sponsored by CyberArk Software, Inc
CASE STUDY: In the wake of a massive data breach that affected nearly 5 million stakeholders, DoorDash, a food delivery service, needed a remediation plan. Read this case study to discover what led to the breach, and the 4 actionable steps DoorDash implemented for reducing the risk of remote vendor access.
Posted: 25 Feb 2020 | Published: 01 Oct 2019

CyberArk Software, Inc

Protecting Your Organization with Strong Security Controls
sponsored by OneNeck IT
WHITE PAPER: The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

OneNeck IT

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info