Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 2263 Matches Previous Page  |  Next Page
The Key Pillars For Protecting Sensitive Data In Any Organization
sponsored by Thales
WHITE PAPER: Traditionally, companies have focused IT security primarily on perimeter defense. While this is important, it’s not enough. With today’s data scattered across networks, organizations need to apply a security strategy that protects data wherever it is. View this white paper to see the CipherTrust Data Security platform by Thales.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Thales

Security Starts Here AD: Account Lifecycle Management
sponsored by Quest
WHITE PAPER: Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Quest

Why Control and Visibility are the Keys to Maintaining ERP Data Security in a Remote Environment
sponsored by Appsian
DATA SHEET: Learn why control and visibility are the keys to maintaining ERP data security in a remote environment.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Appsian

Intelligent Security Solutions for Your Business
sponsored by Konica Minolta
WHITE PAPER: Many organizations don’t have the resources to keep a constant eye on their infrastructure to look out for potential weaknesses or threats. As such, they need to reevaluate their postures to secure the know-how to perpetually monitor their situation. Read this white paper to learn how make your security more intelligent.
Posted: 23 Oct 2020 | Published: 23 Oct 2020


The Total Economic Impact of Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.
Posted: 23 Oct 2020 | Published: 31 Aug 2020

Armor

Is Threat Intelligence the Go-To Weapon for Fighting Advanced Threats?
sponsored by Bitdefender
RESOURCE: The threat intelligence platform (TIP) market is emerging as the go-to weapon against the onslaught of today’s advanced cyberthreats – but what is it about TIPs that make them so effective against these threats? Read this article to find out.
Posted: 23 Oct 2020 | Published: 21 Oct 2020

Bitdefender

How Secureworks Offers a Holistic Approach to Security
sponsored by Dell SecureWorks
WHITE PAPER: In today’s increasingly dangerous threat landscape, only a unified, integrated approach to security can help your organization address these challenges. This white paper talks about how SecureWorks leverages artificial intelligence and machine learning to help organizations build a holistic cybersecurity approach – read on to learn more.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Dell SecureWorks

Securing Your Organization from Threats for Dummies
sponsored by VMware International Unlimited Company
EBOOK: Intrinsic Security For Dummies is your guide to using your infrastructure to simplify and strengthen your approach to security across any app, any cloud, and any device. This e-guide is loaded with information that can help you understand and capitalize on the latest technologies for securing your enterprise.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware International Unlimited Company

5 Ways to Detect Application Security Vulnerabilities Earlier to Lower Cost and Risk using Azure DevOps
sponsored by Lunavi
WHITE PAPER: One of the most persistent problems with creating a secure environment for application development is that security measures often seem to be a step behind or come a moment too late. Read on to learn how, by integrating automated security validation into your continuous integration pipeline, you can finally achieve security that’s up to par.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Lunavi

How to Improve ROI and Operational Efficiency for Cybersecurity
sponsored by Vectra AI
PRODUCT OVERVIEW: The effects of the cybersecurity skills gap are most prominent when it comes to threat detection and response – teams are overworked by the sheer volume of alerts, not to mention the effort it takes to flag and isolate threats before it’s too late. Read this white paper for an overview of Vectra’s AI offering, which aims to remedy this gap.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

The 2020 Spotlight Report on Office 365
sponsored by Vectra AI
WHITE PAPER: Account takeovers are responsible for upwards of $7 billion in annual losses across multiple industries, according to Forrester. The following Spotlight Report from Vectra provides a comprehensive analysis of the cyberthreats targeting Office 365 users, and why some of these attacks are succeeding – read on to learn more.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

Security for Modern Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

The New Economy
sponsored by Armor
WHITE PAPER: In this year’s Dark Market Report, Armor’s security team takes a closer look into the activities occurring in underground cybercrime communities, such as emerging threats, hacker price lists, trending attack vectors, and more – read on to explore the complete findings from the Armor security team.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

Armor

Critical Considerations for Securing Hybrid and Hyperscale Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Modern hybrid and hyperscale data center architectures must include security that can keep pace. But in many of these data center environments today, traditional network security solutions underperform and underserve, forcing compromises on either security or performance. Read this checklist to learn how you can work around this issue.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

Emergency Preparedness: Was Your Company Ready for COVID-19?
sponsored by VMware International Unlimited Company
WHITE PAPER: Emergency preparedness is tricky – it’s nearly impossible to plan for every emergency or incident. This research report from Osterman Research provides an in-depth analysis of emergency preparedness plans pre-COVID-19 and offers best practices for improving incident readiness going forward.
Posted: 22 Oct 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Operational Cost, Security-Related Risk: Quantifying The Value Of Network Security Policy Management
sponsored by FireMon
ANALYST REPORT: Manual management of network security policies, rules and configurations is time-consuming and error-prone, and it adds both operational cost and increases security-related risks — especially as your IT infrastructure grows more complex. Read this analysis quantifying the value of a policy management solution.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

FireMon

Key Considerations for Securing 5G Network Traffic
sponsored by Verizon
WHITE PAPER: The growth of enterprise data is putting pressure on technology professionals to secure and govern it. The generation, networking and storage of this data means that 5G will affect every company’s security posture. So, how can you be prepared for what’s coming? Read this white paper to learn how 5G security will be influenced by evolving threats.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Verizon

From Reactive to Proactive: Keys to Shifting Your Cybersecurity Strategy
sponsored by Dell SecureWorks
WHITE PAPER: A constant state of readiness is crucial when it comes to cybersecurity. Senior leaders who embrace this ethos stand a much better chance of minimizing the damages, risks, and costs than leaders who have no plan and respond to threats reactively. How do you take on this stance? Read this white paper to learn 4 keys to security proactivity.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

You’ve Been Compromised: Now What?
sponsored by Dell SecureWorks
WHITE PAPER: Smart cybersecurity operations require extensive preparation and planning. Without them, organizations run the risk of poorly coordinated incident response (IR) activities that could cause more damage than the compromise itself. So how do you respond the right way? Read this white paper to get the answer.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

The Future of Remote Work: Securing A Distributed Workforce
sponsored by VMware International Unlimited Company
RESOURCE: Nearly all non-essential employees have been working remotely since March, a trend that is likely to continue for the foreseeable future. To help organizations acclimate, VMware offers their Carbon Black Cloud tool, which looks to consolidate and unify security efforts across all control points – read on to explore the key features.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware International Unlimited Company

Is Your Enterprise Network Future Ready?
sponsored by VMware
WHITE PAPER: To keep up with the rapid pace of their businesses, many organizations have adopted a multi-cloud strategy. However, complexity can add up quickly. In this white paper, learn how building a foundation of consistent networking and security across clouds can help simplify multi-cloud operations.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware

On-Demand Webinar: The Importance of Cloud Governance
sponsored by Concourse Labs
WEBCAST: Automated cloud governance is emerging as one of the most effective ways organizations can ensure security and compliance at scale as they migrate towards cloud environments. Watch this webinar to learn more about the importance of cloud governance, its role in digital transformation, and more.
Posted: 21 Oct 2020 | Premiered: Oct 21, 2020

Concourse Labs

The Six Steps to Effective Cloud Governance
sponsored by Concourse Labs
WHITE PAPER: Without effective cloud governance, cloud migrations would present disastrous security risks – threatening an organizations financial health, regulatory compliance and reputation. This eBook provides 6 regimented steps to help organization achieve effective cloud governance.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Eliminate Infrastructure as Code Vulnerabilities at the Source
sponsored by Concourse Labs
DATA SHEET: Download this brief for the key risks associated with Infrastructure as Code (IaC) and get practical tips for demonstrating your cloud security and compliance posture, at every point in time.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Top 10 Security Events to Monitor in Azure AD and Office 365
sponsored by Quest
EBOOK: Microsoft reports that 95 million active directory (AD) accounts are the target of cyberattack each day, and 1.2 million Azure AD accounts are compromised each month. To avoid breaches, you must keep an eye on changes to roles, groups, applications and more. Read this e-book to learn the top 10 events that Azure AD and O365 admins track closely.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Quest
1 - 25 of 2263 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info