Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 1917 Matches Previous Page  |  Next Page
Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium

Strengthen your Financial API Security
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper highlights several areas of concern around API security within your financial enterprise, including access control, data governance and consent management, visibility into the activity of your applications, auditing and forensics. Read on to gain a deeper understanding of API security threats and how to build a solid defense.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Ping Identity Corporation

Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Forescout

Define Your Role
sponsored by SentinelOne
EBOOK: To be a successful CISO is to think on a tactical level, balancing day-to-day security concerns with long-term projects to position your organizations to handle future threats. In this e-book, discover the 12 fundamental questions CISOs should be asking themselves on a frequent basis to help define their role. Read on to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

SentinelOne

MSSPs for Companies of all Sizes
sponsored by Cyberfort
EGUIDE: Organizations, including SMBs, are rapidly looking at the support of a managed security service provider (MSSP) as an alternative to investing heavily in recruitment, staffing costs and finding a solution to the problem of staff retention. Read on to learn more about the benefits of MSSPs today.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Cyberfort

The Secrets of Evaluating Security Products
sponsored by SentinelOne
EBOOK: Prioritizing security and choosing the right tools is critical for business to maintain their IT environments. This e-book goes in-depth into the trends and challenges of cybersecurity, as well as criteria for evaluating security tools. Read on to learn more.
Posted: 15 Nov 2019 | Published: 31 Aug 2019

SentinelOne

Connecting Everything and Everyone
sponsored by Nokia
WHITE PAPER: The number of IoT connected devices is increasing and the market opportunities have encouraged many operators to become IoT service providers. However, this transition brings the challenge of connecting and managing these devices. In this white paper, learn how Nokia Impact can help your organization manage every device from a single platform.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Nokia

Reducing Risks from IoT Devices in an Increasingly Connected World
sponsored by Forescout
WHITE PAPER: With the rise of automation, remote access, and the ever-expanding Internet of Things, IT and OT teams are collaborating at an unprecedented rate to strengthen organizational network security. While these devices offer a number of enhancements to our lives, they also introduce new threats. Read on to learn how you can combat IoT threats today.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Forescout

The Dark Side of the API Economy
sponsored by Ping Identity Corporation
WHITE PAPER: Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners. Collectively this emerging trend is referred to as the API Economy. In this white paper, KuppingerCole Analysts provide key recommendations on designing a comprehensive and future-proof API security strategy.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Ping Identity Corporation

Passive Isn’t Good Enough: Moving into Active EDR
sponsored by SentinelOne
WHITE PAPER: As cyberattacks continue to grow in volume and complexity, it’s become more critical than ever for businesses to deploy active endpoint detection and response (EDR) to provide scalability and security to their various endpoints. This whitepaper discusses the differences and benefits of various EDR methods, read on to learn more.
Posted: 14 Nov 2019 | Published: 31 May 2019

SentinelOne

How to Drive Success
sponsored by SentinelOne
EBOOK: The CISO’s job is about balancing risks, balancing expectations and balancing needs. Like any balancing act, it is one that takes practice to perfect. This e-book leverages the expertise of current CISOs to help new CISOs by guiding them through their first 90 days on the job. Read on to learn more.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

SentinelOne

CCPA and Identity Verification
sponsored by IDology
WHITE PAPER: As 2020 approaches, companies should view CCPA as an opportunity to further engage with their customers, rather than an obstacle. In order to adhere to the requirements, implementing policies that follows the CCPA timeline is imperative.Download this whitepaper to discover why identity verification is so critical to ensuring compliance.
Posted: 14 Nov 2019 | Published: 12 Nov 2019

IDology

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

The Internet of Things (IoT) in a Smart Building
sponsored by Forescout
RESOURCE: When discussing IoT, the definition of what these “things” are can be fuzzy. The IoT also overlaps with previous concepts. To help clarify, this infographic provides an illustration of IoT devices found within a typical smart building network and shows how the systems communicate with one another.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Forescout

Automating Identity & Access Management
sponsored by Hitachi ID
WEBCAST: Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.
Posted: 14 Nov 2019 | Premiered: Feb 28, 2019

Hitachi ID

Future-Proofing Your Information Security Strategy
sponsored by InteliSecure
WHITE PAPER: In this guide, Jeremy Wittkop, Chief Technology Officer, explains why security leaders should start pivoting their security strategies to emphasize the 2 elements of security that are not likely to be diminished: people and data. Read on to learn more about what he thinks really matters in the future of security and what you can do about it now.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

InteliSecure

Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform
sponsored by enSilo
WHITE PAPER: With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.
Posted: 13 Nov 2019 | Published: 31 Mar 2018


Guide to Understanding Ransomware
sponsored by enSilo
WHITE PAPER: Ransomware is an increasingly popular tactic used to steal data and disrupt a system’s operations. In enSilo’s Guide to Understanding Ransomware, discover everything you need to know about protecting and defending against ransomware.
Posted: 13 Nov 2019 | Published: 13 Nov 2019


Discover Hidden API Security Vulnerabilities and How to Defend Against Them
sponsored by Ping Identity Corporation
WHITE PAPER: Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ping Identity Corporation

Protecting Data Capital in Your Organization
sponsored by Dell EMC
WHITE PAPER: With high volumes of business-critical data comes the necessity for innovative and modernized data protection strategies—read this white paper to learn how to keep your most valuable digital assets well protected and compliant.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Dell EMC

Exposing the Top Ten Cloud Security Myths
sponsored by Palo Alto Networks
RESOURCE: Regardless of where your company is on its cloud journey, security challenges remain, with cyberattacks becoming more complex. Constantly evolving threats and innovations are requiring IT leaders to re-evaluate their cloud security strategies. Dive into this article to uncover the 10 biggest security myths about cloud computing.
Posted: 13 Nov 2019 | Published: 31 Jan 2019

Palo Alto Networks

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Leveraging a Smart Lighting System to Enter a Building Network
sponsored by Forescout
RESOURCE: Although smart lighting systems increase energy efficiency, improve working conditions and optimize space utilization in a building, their connection to the internet provides a potential network entry point for malicious actors. Download this infographic to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Forescout

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID
1 - 25 of 1917 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement