Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 1737 Matches Previous Page  |  Next Page
How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 18 Jun 2019 | Published: 31 Aug 2018

VMware

Real-World Customer with Secure Application Infrastructure
sponsored by VMware
WHITE PAPER: In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.
Posted: 18 Jun 2019 | Published: 31 Jul 2018

VMware

How to Protect Your VDI Environment from Ransomware
sponsored by Fhoosh
EGUIDE: One major security risk to VDI environments is ransomware. Ransomware has the potential to be more damaging in VDI than in a physical desktop environment. In this e-guide, explore 3 tips IT administrators can take to better secure VDI environments.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Fhoosh

How Google Cloud Securely Enables Modern End-User Computing
sponsored by Google
RESOURCE: A multilayered security solution that works up and down the enterprise end user computing tech stack, could help your organization be more mobile and more productive, without sacrificing security. Download this blog post to learn more about the benefits of Google Cloud today.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

Google

5 Ways to Secure Applications Wherever They Live
sponsored by VMware
RESOURCE: To create a more secure network, companies should consider restructuring their infrastructure in a way that allows all data to be protected regardless of where it sits in the network. Download this infographic to learn how 5 ways VMware can secure your apps wherever they live.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

VMware

5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019

VMware

CloudCheckr is the Engine Driving Cloud Governance at Siemens
sponsored by Cloudcheckr
CASE STUDY: Railigent monitors the physical infrastructure required to keep rail transportation reliable and safe, but turned to CloudCheckr to ensure the cloud infrastructure it relies on is just as secure. In this case study, learn how CloudCheckr has streamlined Railigent's security protocols to ensure developers can easily identify security issues.
Posted: 17 Jun 2019 | Published: 07 May 2019

Cloudcheckr

Webcast: 5 Steps to Selecting an Enterprise Antivirus Replacement
sponsored by Ziften
WEBCAST: 38% of enterprises plan to replace their AV in the next 12 months, according to The State of Endpoint Security Risk, Ponemon Institute study. However, researching and finding an endpoint security solution can be overwhelming. In this webcast, explore 5 steps to help you select an enterprise antivirus replacement.
Posted: 17 Jun 2019 | Premiered: Jun 17, 2019

Ziften

5 Steps to Selecting an Enterprise Anti-Virus Replacement
sponsored by Ziften
WHITE PAPER: Selecting a replacement for your legacy enterprise antivirus software can be challenging however, there are frameworks to help you go about making the right selection. In this white paper, explore 5 steps to selecting an enterprise antivirus replacement.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

Ziften

Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

ComputerWeekly.com

Guide to Implementing Network Security for Kubernetes
sponsored by Tigera
WHITE PAPER: Kubernetes brings new requirements for networking and security teams. This is because applications, that are designed to run on Kubernetes, are usually architected as microservices that rely on the network. In this white paper, learn how to implement network security for a Kubernetes platform.
Posted: 14 Jun 2019 | Published: 30 Sep 2018

Tigera

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
WEBCAST: In this webinar, listen to two security experts from One Identity talk about how Privileged Access Management is not just about securing passwords and how there's much more that needs to be done to keep your enterprise safe.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY: Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017

HackerOne

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
PODCAST: In this podcast episode with two IAM experts from One Identity, learn more about privileged accounts and how you can block bad actors from accessing your company's data.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY: Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Salesforce Uses Bug Bounties to Protect Customer Data
sponsored by HackerOne
CASE STUDY: Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Understanding Your Attack Surface in AWS (and Other Cloud Providers)
sponsored by Radware
VIDEO: Do you know how your attack surface changes when moving workloads to the public cloud? In this video discussion, learn how you can adapt your security strategy when moving to the public cloud.
Posted: 14 Jun 2019 | Premiered: 14 Jun 2019

Radware

The Total Economic Impact Of Alert Logic SIEMless Threat Management
sponsored by Alert Logic
RESEARCH CONTENT: Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.
Posted: 14 Jun 2019 | Published: 31 May 2019

Alert Logic

The Importance of a Common Distributed Data Services Layer
sponsored by Gigamon
RESEARCH CONTENT: Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Gigamon

Come Hack With Me: The Anatomy of a Data Breach
sponsored by Radware
WEBCAST: Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.
Posted: 13 Jun 2019 | Premiered: Jun 11, 2019

Radware

5 Best Practices for Kubernetes Network Security and Compliance
sponsored by Tigera
WHITE PAPER: As businesses look to modernize their applications, many have turned to Kubernetes because of the benefits containerized workloads bring. However, businesses need to think about securing their applications. In this white paper, explore 5 best practices for securing Kubernetes at the network level.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

How to Capitalize on the Multi-billion Dollar Market for Managed Security Services
sponsored by IBM
WEBCAST: Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

IBM

Aeris and ROAMWORKS: Protecting Cargo from Security Challenges
sponsored by Aeris
CASE STUDY: To assist Dubai Airports achieve its goals, ROAMWORKS, with the help of Aeris, provided an end-to-end platform that enabled airport management to monitor, track, manage, and control their asset data around the world. In this case study, learn more about ROAMWORKS and Aeris' partnership and how they can help protect cargo from security challenges.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Aeris

Solutions for Privileged Account Resilience
sponsored by One Identity
PODCAST: Tune into this informative podcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.
Posted: 12 Jun 2019 | Premiered: Jun 12, 2019

One Identity

Securing Cellular Enterprise IoT Solutions
sponsored by Aeris
WHITE PAPER: Aeris' solutions for cellular IoT device identity, data access security, and remote update management address today's security risks and can help IoT device manufacturers and solution providers comply with existing and near-term regulations. Download this white paper to learn more today.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Aeris
1 - 25 of 1737 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement