Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 1899 Matches Previous Page  |  Next Page
2018 State of the Firewall
sponsored by FireMon
RESOURCE: Even as network security undergoes expansion, the role of the firewall in network security remains critical. Download this resource to review results from a 2018 Firemon survey.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

FireMon

The Evolution of the IT War Room
sponsored by EverBridge Inc.
WHITE PAPER: In this deep dive report, find out exactly how IT war rooms have evolved within the industry, including the changes in role and responsibility distributions, the impact of hybrid infrastructures, average incident response and resolution times, and more.
Posted: 20 Aug 2018 | Published: 30 Apr 2018

EverBridge Inc.

What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets
sponsored by Fidelis
WHITE PAPER: Find out how metadata can transform the way you detect and investigate critical security threats in your network.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

Fidelis

The Value of a Secure Server Infrastructure
sponsored by Dell EMC
WHITE PAPER: In this analysis report, find out why your peers at other IT organizations are placing server security as a top concern. Based on interviews with over 300 IT professionals from server-heavy enterprises, this report sheds light on the concerns and purchasing priorities that are driving the latest infrastructure security trends.
Posted: 20 Aug 2018 | Published: 30 Apr 2018

Dell EMC

Ensure Data Protection with Fidelis Network
sponsored by Fidelis
VIDEO: To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.
Posted: 17 Aug 2018 | Premiered: 17 Aug 2018

Fidelis

Automate & Accelerate Your Security Operations
sponsored by Fidelis
EBOOK: Put your current threat detection and response strategy to the test and with a checklist of the 5 must have security automation capabilities to see if your enterprise is up to speed.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

Fidelis

Modernizing IT Security with Cloud Device Computing Platforms
sponsored by Google
RESOURCE: Learn how this modern, cloud-based device computing platform, can be an effective approach to your organization's major security challenges
Posted: 17 Aug 2018 | Published: 31 Jul 2018

Google

Modern Management of Windows Devices with VMware Workspace One
sponsored by VMware
RESOURCE: Discover ways your organization can let its employees work with the devices they want to use, within or outside of the organization, all while ensuring secure and compliant access to your organization's resources.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

VMware

Australian Companies Leaving Themselves Exposed on Security and Compliance
sponsored by Mimecast
RESEARCH CONTENT: Uncover the shocking survey results that 193 CIOs and IT Managers answered regarding compliance, regulations, and organizational priorities of security and security staff training.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Mimecast

First Midwest Bank Uses Fidelis Deception to Detect and Respond to Security Anomalies
sponsored by Fidelis
CASE STUDY: Learn how a suburban bank used Fidelis Deception to detect and respond to incidents in their network, catching cybercriminals in the act of their crime.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Utilizing Deception for Effective Breach Detection
sponsored by Fidelis
WHITE PAPER: Learn how sophisticated deception software can cover all of the phases of the attack life cycle within your network, so you can catch cybercriminals in the scene of the crime.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Case Study: IT Director, Marek Laskowski, DZP
sponsored by Fidelis
VIDEO: In this video, learn about Fieldis Elevate from IT Director, Marek Laskowski and how it provided DZP with an ability to rapidly detect, investigate, and resolve advanced attacks, enabling the firm to identify both known and unknown threats.
Posted: 15 Aug 2018 | Premiered: 15 Aug 2018

Fidelis

Accelerate and Simplify your Security Operations with Fidelis Elevate
sponsored by Fidelis
VIDEO: Learn how Fidelis Elevate provides understaffed and overwhelmed security teams with context, analysis, and automated workflows.
Posted: 15 Aug 2018 | Premiered: 15 Aug 2018

Fidelis

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In this executive brief, The Secureworks Counter Threat Unit researchers identified lessons learned in threat behaviors, the global threat landscape, and security trends. Take a look at what they found, so you can help protect your organization and learn from past cybersecurity mistakes.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Dell SecureWorks

Context-Aware Security Provides Next-Generation Protection
sponsored by Citrix
RESOURCE CENTER: Learn how a "context-aware" approach to security can help your enterprise identify suspicious activity by honing in on users and their interactions within the system.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Citrix

Australian Organizations Know They Should Be More Cyber Resilient
sponsored by Mimecast
WHITE PAPER: If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Mimecast

Fidelis Deception Demo - Product Overview
sponsored by Fidelis
VIDEO: Tune into this webinar to learn how your organization can use modern deception defenses to ensure an efficient and strong post-breach defense.
Posted: 14 Aug 2018 | Premiered: 14 Aug 2018

Fidelis

Digital Transformation Must Include Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out how you can create a unified security fabric for your network's defense that takes a broad view of endpoints, integrates with your existing security system, and automates key elements of network protection.
Posted: 14 Aug 2018 | Published: 07 Feb 2018

Fortinet, Inc.

How CIOs are Achieving Compliance Using Encryption Management in the New Regulatory Era
sponsored by WinMagic
RESOURCE: Download this resource for a look at a CXO briefing with a 'how to' guide for a simplified approach to compliance with encryption management.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

WinMagic

You Can't Detect What You Can't See: Illuminating the Entire Kill Chain
sponsored by Fidelis
VIDEO: Visibility is a top challenge for cybersecurity teams today. Without having a clear view, it's almost impossible to detect threats across every stage of the kill chain. In this webinar, cybersecurity experts Dr. Chenxi Wang and Tim Roddy review the many blind spots in the security environment. Learn how to gain visibility, today.
Posted: 14 Aug 2018 | Premiered: 08 Aug 2018

Fidelis

The Security Practice Maturity Model: Where Do You Stand?
sponsored by Juniper Networks
RESOURCE CENTER: In this custom article, learn how your organization can take a simplified approach towards advanced threat protection and apply cyber-automation to its security strategy, today.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

Juniper Networks

Making BitLocker Simple, Smart and Secure for You
sponsored by WinMagic
WHITE PAPER: Microsoft BitLocker already offers data protection capabilities like high-performance, built-in OS encryption, integration with Microsoft Azure and more, but learn of the potential opportunities and benefits that come with adding an additional encryption tool to BitLocker.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

WinMagic

Veeam Backup & Replication 9.5 Update 3: Infrastructure Hardening
sponsored by GreenPages Inc.
WHITE PAPER: This paper provides practical advice to help admins reduce their infrastructure attack surface so that they can confidently deploy Veeam services and lower their chances of being compromised. Read on for several measures to take to harden your Veeam Availability infrastructure against threats.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

GreenPages Inc.

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat
sponsored by Dell SecureWorks
WHITE PAPER: Learn how your enterprise can benefit from shifting from a traditional security approach to advanced malware detection, today.
Posted: 14 Aug 2018 | Published: 31 Dec 2015

Dell SecureWorks

Is End User Training Essential to Data Loss Prevention Program Success?
sponsored by Docauthority
EGUIDE: Regulations like GDPR promise to enforce stricter data protection rules. While a data loss prevention program can help, it requires end-user training to ease adoption. Download this article to see how writer, Mekhala Roy, gives insight into a training approach for data protection.
Posted: 13 Aug 2018 | Published: 28 Feb 2018

Docauthority
1 - 25 of 1899 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement