IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration Reports
 
Tanium for IT Operations Management
sponsored by Tanium
DATA SHEET: According to Forrester, 74% of organizations state that the number of endpoint tools they have limits their effectiveness. Patchwork point services are disparate and incomplete in their visibility. In this solution brief, dive deeper into the pains of legacy point services and explore Tanium’s Operations Suite. Read on to learn more.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

Moorabool Shire Council Case Study
sponsored by Mimecast
CASE STUDY: In this case study, discover how Moorabool Shire Council was able to immediately reduce the number of phishing and whaling attacks in order to reduce IT workload while maintaining security for the 250 email users within their municipality.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Mimecast

Is Noise Pollution Making Your Data Less Secure?
sponsored by F5 Networks
WHITE PAPER: Automated attacks are increasing in frequency and sophistication, with about 77% of web attacks starting from botnets. With the increasing volume of cyberattacks, it’s critical for organizations to ensure accurate logs. Continue to this article to uncover the importance of logging and how F5’s Advanced WAF service can help.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks

Rise of the Machines: Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: Information technology (IT) & operational technology (OT) were, for a long time, regarded as two distinct areas within an organization. Now these two domains are interconnected, thanks to the Internet of Things (IoT) revolution.But what are these “things”, what do they have to say & are we listening? Read on to learn more.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Forescout

Accelerating the Journey to Passwordless Authentication
sponsored by IBM
WHITE PAPER: A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.
Posted: 19 Nov 2019 | Published: 31 Jul 2019

IBM

Automation’s Rising Tide: How to Manage Bots in Today’s World
sponsored by F5 Networks
EBOOK: As bot technology, machine learning, and AI continue to evolve, it is more critical than ever for your organization to be prepared to deal with the impact of bots – both good and malicious. This e-book will guide you as you develop a comprehensive, flexible strategy to address the impact of bots. Read on to get started.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

F5 Networks

14 Zero Trust eXtended (ZTX) Ecosystem Providers
sponsored by Okta
ANALYST REPORT: Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.
Posted: 06 Dec 2019 | Published: 29 Oct 2019

Okta

Lookout discovers Monokle, new mobile surveillanceware
sponsored by Lookout
WEBCAST: In July of 2019, Lookout’s Security Research team announced its discovery of Monokle, a set of mobile surveillanceware tools. These tools were connected to a Russia-based company sanctioned by the U.S. Government in connection with the 2016 Presidential election. Continue to watch a brief video highlighting this discovery!
Posted: 22 Nov 2019 | Premiered: Aug 13, 2019

Lookout

Getting Started with Zero Trust: Never Trust, Always Verify
sponsored by Okta
WHITE PAPER: As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Insider Threat Management in 2020 – What’s Your Plan?
sponsored by ActivTrak
RESOURCE: Whether malicious or accidental, insider attacks can leave organizations feeling vulnerable and eager to prevent future incidents, and a little bit of consideration can save time and money when incidents occur. Read this white paper to uncover the key areas to consider for your 2020 insider threat program checklist.
Posted: 10 Dec 2019 | Published: 21 Oct 2019

ActivTrak
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement