IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration Reports
 
The Importance of Identity in Securing Your Business
sponsored by Okta
VIDEO: Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.
Posted: 17 Sep 2020 | Premiered: 17 Sep 2020

Okta

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Getting Started with CASB
sponsored by Proofpoint
WHITE PAPER: Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Proofpoint

Tension between IT and Security Professionals Reinforces Silos and Security Strain
sponsored by VMware
WHITE PAPER: IT and security teams have a hard time seeing eye to eye. They are often siloed as a result, and this can be a major risk to network integrity. VMware commissioned Forrester Consulting to learn how consolidating IT and security could help improve security outcomes. Read their report to see the results and learn 3 key findings.
Posted: 31 Aug 2020 | Published: 31 May 2020

VMware

Proofpoint CASB Adaptive Access Controls
sponsored by Proofpoint
DATA SHEET: Cloud-based networking has enabled never-before-seen flexibility, but the vulnerability of the cloud and the now-widespread use of unmanaged devices has driven security risk through the roof. A CASB is a viable option to help mitigate this risk. Browse this solution brief to understand the technology behind CASB and why it is gaining popularity.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Proofpoint

Technology Supporting People
sponsored by Advizex
CASE STUDY: In this case study, discover the results of a healthcare provider’s recent project designed to quantify and better understand the issues they were facing surrounding identity and access management. Read on to discover what led to this project and the outcomes of their partnership with Advizex.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Advizex

KVC Health Systems Eliminates Email Security Incidents with Vade Secure
sponsored by Vade Secure
CASE STUDY: In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


5 Steps to Making Better Security Decisions
sponsored by ThreatQuotient
WHITE PAPER: The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

ThreatQuotient

Why Seconds Matter
sponsored by Palo Alto Networks
WHITE PAPER: Todays' hackers are enjoying threats such as polymorphic malware that can avoid detection by constantly changing its identifiable features. How do security teams get around malleable threats? With inline machine learning, organizations may be able to stop threats while keeping business going. To learn more, read this comprehensive white paper.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Palo Alto Networks

The State of Ransomware 2020
sponsored by Sophos
WHITE PAPER: Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.
Posted: 11 Sep 2020 | Published: 31 May 2020

Sophos
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info