Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 1862 Matches Previous Page  |  Next Page
Evolving Micro-Segmentation for Preventive Security: Adaptive Protection in a DevOps World
sponsored by VMware
ANALYST REPORT: Download this SANS research white paper to learn about evolving micro-segmentation for preventive security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

VMware

The Hacker Powered Security Report 2019
sponsored by HackerOne
ANALYST REPORT: Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

HackerOne

IT Security is Broken
sponsored by VMware
RESOURCE: Only 25% of EMEA business leaders are confident in their cybersecurity. In this infographic, learn how you can fix IT security by building intrinsic security into everything, encouraging a collaborative culture of cybersecurity awareness, and more.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

VMware

How Confident Are You That You Have Total Asset Visibility?
sponsored by BT
WHITE PAPER: WannaCry underlined the fact that, where network discovery is concerned, some visibility is effectively no visibility. Find out how you can get total asset visibility—and why it's so important—in this brief white paper.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

BT

How Do You Cultivate Compliance to Protect Your Business?
sponsored by Concur Technologies
WHITE PAPER: Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Concur Technologies

Euronext Safeguards Pan-European Trading with Cymulate Breach and Attack Simulation
sponsored by Cymulate
CASE STUDY: Euronext, a leading pan-European marketplace, sought a more cost-effective way to test their security posture to complement the cyberattack simulations they have been running to date. After reviewing different solutions, Euronext decided to deploy Cymulate's Breach & Attack Simulation. In this case study, explore the benefits that Euronext saw.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Cymulate

Gigamon Industry Brief: Enterprise
sponsored by Gigamon
PRODUCT OVERVIEW: Network performance and security are vital elements of any business. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. In this brief, learn how Gigamon Visibility Platform can help balance the needs for network efficiency and security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Gigamon

Optimizing the Security Stack
sponsored by Morphisec, Inc.
DATA SHEET: In this white paper, examine the optimal way to protect endpoints from both known and unknown attacks and review the Windows Defender Antivirus offering.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Morphisec, Inc.

Tech Powering your CX Might be Dragging Revenue
sponsored by The Media Trust
RESOURCE: Unknown third-party code outside of your control can introduce new risks or heighten existing ones. Read on to learn about digital risk scans and how you can reduce digital revenue threats like customer information theft, data leakage, site latency, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

The Media Trust

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: CyberEdge Group's 6th annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Download this report to uncover countless insights you can use to better understand how your priorities and security postures stack up against those of your peers.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Gigamon

How to Automate API Security
sponsored by Data Theorem
WHITE PAPER: As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Data Theorem

Red Cloak Threat Detection & Responses
sponsored by Dell SecureWorks
WEBCAST: Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.
Posted: 13 Sep 2019 | Premiered: Sep 13, 2019

Dell SecureWorks

Morphisec Unified Threat Prevention
sponsored by Morphisec, Inc.
DATA SHEET: Today's advanced cyberattacks hit quickly and are engineered to evade detection-based forms of defense. Security teams and their tools are left trying to constantly catch up. Morphisec doesn't have to. Download this brief to learn about the benefits and capabilities of Morphisec Unified Threat Prevention.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Morphisec, Inc.

Building a Customer-Obsessed IAM Team
sponsored by Akamai Technologies
ANALYST REPORT: Download this Forrester Report for an overview of the skills and job descriptions required to manage CIAM effectively. This report also details hiring best practices and the typical organizational ownership of CIAM and how it plays with other technology management and business teams.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Akamai Technologies

Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
EBOOK: How can you protect your organization from malicious cryptomining? Download this brief to learn how Cisco Umbrella can block at the IP and domain level, as well as analyze risky domains and much more.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Cisco Umbrella

6 Degrees of Network Security
sponsored by Cisco Umbrella
RESOURCE: A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Download this infographic to uncover 6 common security pitfalls that put your users, their devices, and your data at risk.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Cisco Umbrella

Web Browser-Based Attacks
sponsored by Morphisec, Inc.
RESOURCE: Browsers are integral to an effective working environment but they also serve as the perfect cyberattack vector. Web-based attacks are one of the top methods of system compromise and they are on the rise. In this brief, explore common types of web threats.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Morphisec, Inc.

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Morphisec Plus Defender AV And ATP
sponsored by Morphisec, Inc.
DATA SHEET: In this solution brief, learn about the Morphisec Unified Threat Prevention platform and how it can terminate advanced threats.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

Countering Evasive Threats With Moving Target Defense
sponsored by Morphisec, Inc.
WHITE PAPER: Download this white paper to learn about Moving Target Defense (MTD) and how it leverages the tactics used by sophisticated attackers — deception, modification and polymorphism — to level the cybersecurity playing field.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

Ramp Up Security and Productivity with Cloud MFA & SSO
sponsored by Ping Identity Corporation
WHITE PAPER: In this white paper, learn about a cloud identity and access management (IAM) solution that cost-effectively mitigates password security and access control concerns, improves user productivity, and is simple enough for generalists to integrate and manage.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Ping Identity Corporation

How a Leading Professional Services Firm Enhanced Collaboration with Cloud Security
sponsored by Cisco Umbrella
CASE STUDY: Global professional services firm, Arup, moved from Cisco Cloud Web Security to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go and reduced its exposure to malware. Download this case study to learn more.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Cisco Umbrella

Efficient Efficacy with Morphisec Unified Threat Prevention Platform
sponsored by Morphisec, Inc.
ANALYST REPORT: This ESG Technical Validation documents evaluation of Morphisec's moving target defense-powered Unified Threat Prevention Platform. Read on for a look at the operational simplicity of the platform and the efficacy of its threat prevention capabilities.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Morphisec, Inc.

How Yelp Connects People with Great Local Businesses Securely
sponsored by Cisco Umbrella
CASE STUDY: As Yelp's customer base and the internal infrastructure to support it has expanded, they needed to stay ahead of attacks. In order to do this, they were looking to strengthen and automate their incident response and detection processes. In this case study, discover the benefits Yelp saw after deploying Cisco Umbrella.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Cisco Umbrella
1 - 25 of 1862 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement