Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 2173 Matches Previous Page  |  Next Page
Market Guide for Compliance Automation Tools in DevOps
sponsored by AWS - Anitian
RESOURCE: Meeting security and compliance requirements can be a complicated and resource-consuming process for organizations adopting DevOps. This Gartner report provides a comprehensive analysis of the DevOps compliance automation market – offering strategic recommendations, required capabilities and more. Read on to get started.
Posted: 13 Aug 2020 | Published: 08 Jun 2020


The FedRAMP Journey
sponsored by AWS - Anitian
PRODUCT OVERVIEW: The Federal Risk and Authorization Management Program (FedRAMP) is traditionally a complex process requiring time and resources. The following solution brief takes a closer look at the Anitian Compliance Automation Platform, designed to reduce the costs and complexity when it comes to FedRAMP readiness.
Posted: 13 Aug 2020 | Published: 13 Aug 2020


EMA Evaluation Guide to Privileged Access Management (PAM)
sponsored by Remediant
WHITE PAPER: Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Remediant

Managed Detection and Response (MDR) Buyer’s Guide
sponsored by CrowdStrike
WHITE PAPER: By 2024, Gartner predicts that 25% of organizations will be using MDR services. But what exactly is MDR, and why does Gartner predict the rise in popularity? Download this MDR buyer’s guide to learn more about MDR, including core elements and how to navigate the vetting process.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

CrowdStrike

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant

Fighting Fraud
sponsored by Dtex
NEWSLETTER: In this issue of the Fighting Fraud e-newspaper, observe a series of articles dedicated to highlighting the global trends, challenges and advancements as they relate to fraud. Key topics covered in this issue include Brexit, artificial intelligence, insider threats, the true cost of cybercrime, and more.
Posted: 13 Aug 2020 | Published: 23 Oct 2019

Dtex

Everyone as a Trusted Insider
sponsored by Dtex
PRODUCT OVERVIEW: Insider threats are on the rise, and traditional monitoring is too reactionary to handle today’s sophisticated attack methods. In this report, take a closer look at Dtex’s replacement to traditional employee monitoring – designed to promote employee privacy, proactive threat prevention, behavioral understanding of threats, and more.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Dtex

The IoT Business Index 2020: A Step Change in Adoption
sponsored by ARM
ANALYST REPORT: The IoT Business Index 2020 reveals that, after slow movement between 2013 and 2017, IoT adoption finally progressed from planning into practice in the 3 years leading up to 2020. Download this report to explore key findings from the report and explore lessons learned during this period of increased adoption.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

ARM

Enhance the Safety and Security of Your People, Assets and Operations
sponsored by Dell Technologies and Intel
WHITE PAPER: For organizations looking to keep pace with today’s dynamic world, the addition of each new IoT device requires storage, security, and performance considerations. In this white paper, take a closer look at today’s IoT challenges and discover how Dell is working to address them. Learn more about Dell solutions powered by Intel®
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Dell Technologies and Intel

Enterprise Ready Zero-Standing Privilege
sponsored by Remediant
WEBCAST: One of the biggest causes of continued data breaches is standing privilege. In this video, learn about Remediant SecureOne, which makes it easier to discover, measure, and manage standing privilege at your organization.
Posted: 12 Aug 2020 | Premiered: Aug 12, 2020

Remediant

Fortinet Delivers the Most Flexible SASE Solution
sponsored by Fortinet, Inc.
WHITE PAPER: Networks have been fundamentally transformed by digital innovation, cloud adoption, and the recent widespread shift to remote work. Increased reliance on cloud resources and environments has necessitated a new approach to secure network access. Jump into this white paper for an up-close look at SASE, which can support dynamic secure access needs.
Posted: 12 Aug 2020 | Published: 04 Aug 2020

Fortinet, Inc.

Dtex Intercept Next-Gen Insider Threat Platform
sponsored by Dtex
PRODUCT OVERVIEW: Insider threats, both malicious and accidental, are a growing concern amongst today’s organizations. The following solution brief highlights the key features and capabilities of Dtex Intercept, an insider threat platform designed to equip users with the ability to proactively identify, categorize and isolate potentially harmful insider behavior.
Posted: 12 Aug 2020 | Published: 12 Aug 2020

Dtex

Fortinet Acquires Cloud Security and Networking Innovator OPAQ Networks
sponsored by Fortinet, Inc.
RESOURCE: Secure Access Service Edge (SASE) and Zero Trust Network Architecture (ZTNA) can provide evolved threat protection on their own, but when put together, organizations can be remote ready during this unprecedented time. Read this blog post that details Fortinet’s acquisition of OPAQ, which will allow SASE to meet ZTNA.
Posted: 12 Aug 2020 | Published: 20 Jul 2020

Fortinet, Inc.

A Proven Approach to Cloud Workload Security
sponsored by CrowdStrike
WHITE PAPER: As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Read this whitepaper to uncover CrowdStrike’s lessons learned, observational insights and expertise.
Posted: 12 Aug 2020 | Published: 12 Aug 2020

CrowdStrike

How to Eliminate Security & Compliance Impediments on Your Journey to the Cloud
sponsored by AWS - Anitian
WEBCAST: In this webcast, learn the business, security, and DevOps benefits of automating security, get an inside look at security automation and how it helps DevOps teams, and discover how to achieve the fastest time-to-market possible on AWS by leveraging cloud security & compliance automation.
Posted: 12 Aug 2020 | Premiered: Aug 12, 2020


Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 12 Aug 2020 | Published: 31 Jul 2020

Barracuda

Breaking the Tension Between IT and Security
sponsored by VMware International Unlimited Company
ANALYST REPORT: IT and security are currently in a bad marriage. Efforts must be made for the two to be more closely aligned for organizations to have future success. Forrester has reported that unifying and consolidating IT and security will make for fewer breaches, better reaction time to threats, and improved IT hygiene. Read their report to learn more.
Posted: 12 Aug 2020 | Published: 31 Jul 2020

VMware International Unlimited Company

Powerful and secure data transmission as key element of IT security
sponsored by Rohde & Schwarz
WHITE PAPER: Organizations are becoming increasingly aware of the need to prioritize IT security in order to ensure protection grows at the same rate as productivity. However, the constantly changing nature of IT security can make it unclear where to start. This white paper provides an overview of the IT security fundamentals – read on to get started.
Posted: 11 Aug 2020 | Published: 11 Aug 2020


Cloud Access Security Brokers: Top Vendors & Offerings
sponsored by McAfee
RESOURCE: The popularity of Cloud Access Security Brokers (CASBs) as an effective measure for cloud data protection is on the rise. In order to help you select the right vendor for your unique needs, Gartner conducted a comprehensive analysis of the top CASB vendors and offerings in today’s market – read on to unlock the Magic Quadrant report.
Posted: 11 Aug 2020 | Published: 05 Nov 2019


Cloud is the dream, don’t let risk and compliance be your nightmare
sponsored by Xtravirt
WHITE PAPER: Organizations worldwide are adopting cloud capabilities at an unprecedented rate in order to ensure flexibility and scalability in uncertain times. However, effective cloud environments require cloud-ready compliance and risk considerations. Download this white paper to evaluate and gauge your organization’s cloud security readiness.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Xtravirt

Breaking the Tension
sponsored by VMware International Unlimited Company
RESOURCE: In a survey of 668 manager-level and above IT and security respondents, 48% say that IT and security teams will be unified in 3 to 5 years. And 84% say that the two currently have a negative relationship. Collaboration between IT and security is a tall mountain for leaders to climb, but viewing the results of this survey may give you an advantage.
Posted: 11 Aug 2020 | Published: 28 Feb 2020

VMware International Unlimited Company

The Essential Guide to Foundational Security Procedures
sponsored by Splunk
WHITE PAPER: Download your complimentary copy of “The Essential Guide to Foundational Security Procedures” to learn how to build standard security procedures, respond to threats quickly with orchestrated workflows, and leverage Splunk Phantom for orchestration and automation.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Splunk

Take your SIEM to the Cloud
sponsored by Splunk
WHITE PAPER: Download your complimentary copy of the white paper Take Your SIEM to the Cloud to learn about how to improve your security posture using a cloud-based SIEM, the flexibility a cloud-based SIEM solution can provide, and the power of big data analytics and a SIEM in the cloud.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Splunk

Secure Hybrid Cloud: The Strategic Approach to Enterprise IT
sponsored by IBM
ANALYST REPORT: This 451 Research Pathfinder report was written to help navigate IT and security decision-makers through specific issues related to hybrid cloud security technologies and provides recommendations & considerations throughout the decision-making process. Download the report to get started.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

IBM

Panel Discussion: Securing the Cloud
sponsored by Dell SecureWorks
WEBCAST: The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Dell SecureWorks
1 - 25 of 2173 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info