Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
26 - 50 of 1952 Matches Previous Page  |  Next Page
Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

What Every Company Should Know About Cookies
sponsored by Namogoo
EBOOK: Nearly every website relies on cookies to allow them to collect specific data on their visitors to enhance customer experience. But as helpful as they can be, the information stored on them can pose a privacy risk. In this e-book, explore the various types of cookies and how they will be affected by data privacy laws.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

Namogoo

Beginner's Guide to Employee Monitoring
sponsored by ActivTrak
WHITE PAPER: On the surface, employee monitoring systems might seem like a fancy way to babysit employees. However, this technology stands as a far more valuable tool than people give it credit for. In this white paper, learn about several security benefits of employee monitoring systems.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

ActivTrak

Rethinking Enterprise Data Defense
sponsored by FireMon
EBOOK: Despite heavy investment of time and resources, the number of cybersecurity breaches and incidents continues to increase each year. In this e-book discover how to rethink your enterprise security strategy and explore proactive defense tactics.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

FireMon

Is the Cloud Transforming Security?
sponsored by Menlo Security
WEBCAST: As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

Menlo Security

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Electronic Communications Compliance Survey Report
sponsored by Smarsh
ANALYST REPORT: Regulatory oversight is growing more sophisticated as the communications technology landscape continues to evolve. In this 2019 research report, Smarsh revels key findings from a survey of financial services professionals responsible for the retention, archiving, and oversight of electronic communications.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Extreme AI Security
sponsored by Extreme Networks
PRODUCT OVERVIEW: In this brief, learn how ExtremeAI Security can help to defend against cyberattacks by delivering an innovative, AI-powered solution for IoT device security coupled with automated threat remediation and containment.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Extreme Networks

Next-Gen Deception Technology: Moving Beyond Honeypots
sponsored by Illusive Networks
WHITE PAPER: As the market has evolved, three general types of deceptions have emerged; full interaction decoys (honeypots), partial or low interaction emulated decoys, and endpoint data deceptions. In this white paper, explore each type of deception and review the increasing complexity of deception technology.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Illusive Networks

Isolation: Separating Malware from the Network, Not Devices
sponsored by Menlo Security
WHITE PAPER: As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Menlo Security

Guide to Eliminating the Top 3 Security Pain Points
sponsored by Menlo Security
WEBCAST: In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.
Posted: 26 Nov 2019 | Premiered: Sep 26, 2019

Menlo Security

The Security Concerns of Cloud Cryptomining Services
sponsored by Cisco Umbrella
EGUIDE: With the rise in value and popularity of cryptocurrencies, cybercriminals are often targeting them in their attacks. Since cloud mining providers aren’t bound by the same regulations as a traditional bank, it’s more critical than ever for investors to consider the security practices of cloud cryptomining companies. Read on to get started.
Posted: 26 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

Your Third-party Risk Management Best Practices Need Updating
sponsored by ServiceNow
EGUIDE: Traditional best practices for third-party risk management are leaving organizations vulnerable. In this e-guide, learn how to improve accuracy of security questionnaires, interview third-party employees about risk and rethink third-party risk management best practices in this changing threat landscape.
Posted: 26 Nov 2019 | Published: 15 Nov 2019

ServiceNow

9 Email Security Features to Help Prevent Phishing Attacks
sponsored by Cisco Umbrella
EGUIDE: For as long as email exists, phishing will continue to be a threat. While the risks of phishing can’t be eliminated, your organization can enhance its email security to prevent a breach. In this e-guide, discover 9 email security features designed to help prevent phishing attacks.
Posted: 25 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

Global Smart Meter Manufacturer Secures Move to Microsoft Intune with Lookout
sponsored by Lookout
CASE STUDY: With organizations growing more reliant on remote access capabilities, endpoint security becomes necessary to meet internal and industry security regulations. In this case study, discover how Landis+Gyr, an energy management leader, developed and deployed an advanced mobile security strategy to protect their endpoints
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Lookout

Post-Perimeter Security 101: Dawn of a Borderless World
sponsored by Lookout
WEBCAST: With organizations’ networks expanding to accommodate the need for mobile device access, perimeter security tools and practices have changed to include remote endpoints. In this webinar, Lookout’s Chief Security Officer, Aaron Cockerill, shares his expertise in protecting sensitive data in a ‘post-perimeter’ landscape.
Posted: 25 Nov 2019 | Premiered: Mar 4, 2019

Lookout

Combining GRC programs with BC and DR
sponsored by ServiceNow
EGUIDE: In this e-guide, explore the tools used for gathering critical data and discover why Governance, risk management and compliance (GRC) and Business continuity (BC) teams should collaborate to concentrate their efforts in order to build a comprehensive data privacy program.
Posted: 25 Nov 2019 | Published: 15 Nov 2019

ServiceNow

Addressing CCPA: Legacy ERP and Data Privacy Compliance
sponsored by Appsian
PRODUCT OVERVIEW: With the 2020 launch date for CCPA looming, organizations are scrambling to ensure they have appropriate security measures in place. In this solution brief, highlight the gaps within current security capabilities and explore how organizations can enhance their legacy ERP apps to ensure CCPA compliance.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Appsian

Your Firewalls Are Dirtier Than You Think
sponsored by FireMon
DATA SHEET: Outdated firewall practices can leave vulnerabilities within your organizations network. These gaps can lead to security risks and underperformance. This infographic highlights the 4 steps for improving your firewall cleanup process. Read on to learn more.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

FireMon

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium

Quantifying the Point Solution Nightmare
sponsored by Tanium
WHITE PAPER: Forrester, in partnership with Tanium, conducted research into the current state of security and operations tools, teams, and trends to quantify the complexity of endpoint security management and integration. Read on to uncover the results and conclusions.
Posted: 22 Nov 2019 | Published: 31 May 2019

Tanium

Data Privacy Is the New Strategic Priority
sponsored by IBM
WHITE PAPER: Recently, Forrester conducted research, in partnership with IBM to evaluate enterprises’ data privacy compliance with increasing regulatory requirements. Read on to uncover the key insights from the research.
Posted: 22 Nov 2019 | Published: 31 Jul 2019

IBM

Lookout discovers Monokle, new mobile surveillanceware
sponsored by Lookout
WEBCAST: In July of 2019, Lookout’s Security Research team announced its discovery of Monokle, a set of mobile surveillanceware tools. These tools were connected to a Russia-based company sanctioned by the U.S. Government in connection with the 2016 Presidential election. Continue to watch a brief video highlighting this discovery!
Posted: 22 Nov 2019 | Premiered: Aug 13, 2019

Lookout

Schneider Electric Secures 50,000 Devices with Lookout
sponsored by Lookout
CASE STUDY: As organizations shift towards remote access capabilities, securing mobile devices should be a top priority. In this case study, discover how Schneider Electric, a leader in energy management and automation, was able to build a complete mobile security strategy.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Lookout

Core Principles of Cyber Hygiene in a World of Cloud and Mobility
sponsored by VMware
WHITE PAPER: Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news broadcast. In this white paper, learn how to address vulnerabilities before they become disastrous.
Posted: 22 Nov 2019 | Published: 15 Mar 2019

VMware
26 - 50 of 1952 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement