IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration Reports
 
Improve Threat Resolution Cycles By Leveraging Dns
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
PRESENTATION: Today’s cyberthreats are becoming increasingly troublesome, and traditional security efforts often lack the unified vision and visibility required to tackle these challenges. Read this presentation for a closer look at today’s advanced threats and discover how Endpoint detection and response (EDR) tools are uniquely positioned to address them.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Bitdefender

Market Guide for Insider Risk Management Solutions
sponsored by Proofpoint
RESEARCH CONTENT: Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Use this Gartner Market Guide to understand and implement insider risk mitigation.
Posted: 11 Feb 2021 | Published: 29 Dec 2020

Proofpoint

10 Reasons Msps Should Add Security Awareness Training To Their Offering
sponsored by Webroot
RESOURCE: If you are a managed service provider (MSP) providing industry-leading cybersecurity services, modern malware tactics are too complex to guarantee 100% that your clients will stay safe. But adding security awareness training to your offering may just improve your and your clients’ odds of success. Download this resource to learn 10 reasons why.
Posted: 23 Mar 2021 | Published: 18 Dec 2020

Webroot

The Road To A Successful, Secure, And Stable Cloud Transformation
sponsored by Alert Logic
EBOOK: The benefits of the cloud are no longer a secret, and neither are the risks. Companies can gain quite an advantage by migrating to the cloud, but they must go about it the right way in order to fully reap the benefits. Technically speaking, you must be mindful of security all the way. Access this guide to learn the 3 phases of cloud transformation.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alert Logic

Making It Safe for Federal Employees to Work Remotely
sponsored by Forcepoint
EBOOK: The Office of Management and Budget (OMB) released guidance recommending agencies implement ‘maximum’ telework flexibility where possible. While you may have some security in place to accommodate this sudden shift, it’s tough to be fully prepared. Study this e-book to learn tips for securing federal remote workers.
Posted: 22 Feb 2021 | Published: 14 May 2020

Forcepoint

Aflac Enhances Cyber Threat Intelligence And Integrates Security Ecosystem With Infoblox
sponsored by Infoblox
CASE STUDY: In this case study, discover how Aflac, a major insurance provider in the US, was able to tackle a massive transformation across 3 fronts: cloud, threat intelligence, and cybersecurity. Read on to see why they chose Infoblox as their trusted strategic partner and discover the results of Aflac’s 3 major projects.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Infoblox

6 Steps To Overcoming Pci Dss Compliance Challenges In Multi - Cloud And Hybrid Environments
sponsored by Alert Logic
EBOOK: In Verizon’s Payment Security Report, 63.3% of the organizations assessed did not maintain all PCI DSS controls. And this is not due to a lack of security tools – rather, organizations are missing PCI expertise, or the dedicated staff required to keep pace. Access this e-book to unlock 6 steps to overcoming PCI compliance challenges.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alert Logic

Cybersecurity is Improving, But is it Enough?
sponsored by eSentire
WHITE PAPER: Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.
Posted: 17 Feb 2021 | Published: 31 Oct 2019

eSentire

The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences