Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
76 - 100 of 2263 Matches Previous Page  |  Next Page
Is Your Enterprise Network Future Ready?
sponsored by VMware International Unlimited Company
WHITE PAPER: To keep up with the rapid pace of their businesses, many organizations have adopted a multi-cloud strategy. However, complexity can add up quickly. In this white paper, learn how building a foundation of consistent networking and security across clouds can help simplify multi-cloud operations.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

VMware International Unlimited Company

How to Remove Data Security Risk from File Transfers
sponsored by HelpSystems
WEBCAST: In this video demonstration, learn about HelpSystems’ managed file transfer, advanced threat protection, and adaptive data loss prevention solutions.GoAnywhere MFT and Clearswift – both part of the data security suite from HelpSystems – work together to improve your cybersecurity stance.
Posted: 13 Oct 2020 | Premiered: Oct 13, 2020

HelpSystems

Aruba Policy Enforcement Firewall — Cyber Catalyst Designation
sponsored by TechData
RESOURCE: In this quick fact sheet, find out how the Aruba Policy Enforcement Firewall is designed to be a key component of any organization’s zero-trust architecture.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

TechData

Ransomware Prevention and Remediation
sponsored by BlackBerry
PRODUCT OVERVIEW: According to a recent study, 62% of organizations were victimized by ransomware – 58% of which opted to pay the ransom. As this threat vector becomes more lucrative for cybercriminals, expect these numbers to go up. So, what can be done about ransomware? Read this solution brief for BlackBerry’s answer.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

The New Reality
sponsored by BlackBerry
WHITE PAPER: Although issues related to protecting and managing endpoints existed long before COVID-19, the recent pandemic put a spotlight on these issues. In order to address these challenges, organizations are opting for unified endpoint security solutions – read on for an in-depth look at what that entails and why it’s gaining popularity.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

What is Security's Role in Digital Transformation?
sponsored by Rackspace
RESOURCE: The past few years have seen massive upticks of digital transformations – offering businesses the ability to enhance the speed, agility and quality of their DevOps teams and lifecycles. But given the current threat landscape, it's critical to understand the role of security in digital transformations – read on to learn more.
Posted: 13 Oct 2020 | Published: 25 Feb 2020

Rackspace

Don’t Compromise on Security in a Crisis
sponsored by BlackBerry
WHITE PAPER: As organizations encourage their employees to work from home as a measure of personal health and safety, criminals are looking to take advantage of the transition period as an entry point for their cyberthreats. In this white paper, discover how to achieve effective remote worker security that doesn’t sacrifice efficacy.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

AI-Driven EDR
sponsored by BlackBerry
EBOOK: Endpoint detection & response (EDR) is a rapidly evolving technology that continues to outsmart threats outside the network and respond to those within it. Now, the power of artificial intelligence is granting EDR even more capability while lowering cost. Jump into this e-book to get a closer look at AI-driven endpoint detection & response.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

Cybersecurity Built for Your Business, Budget and Staff
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

Multicloud Security Services
sponsored by Rackspace
VIDEO: As cloud migration continues to grow in popularity, organizations are beginning to realize that traditional cybersecurity approaches are ill-fitted to address the security needs of cloud environments. Watch this webinar to discover how Rackspace and Google Cloud are working together to address these threats.
Posted: 12 Oct 2020 | Premiered: 12 Oct 2020

Rackspace

Remote Work Is the Future
sponsored by BlackBerry
CASE STUDY: Remote work is quickly becoming a new reality for the foreseeable future. In this case study, discover what led ConvergeOne, a professional and managed services provider in North America, to partner with BlackBerry and explore the outcomes of their remote work project.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

BlackBerry

Akamai Moves into Web Browser Security with Page Integrity Manager
sponsored by Akamai Technologies
WHITE PAPER: Malicious script activity has emerged as a new way for cybercriminals to conduct credit card skimming and other types of attacks. This 451 Research report provides a comprehensive overview of the Akamai Page Identity Manager, designed to combat this growing threat.
Posted: 12 Oct 2020 | Published: 22 May 2020

Akamai Technologies

Governance, Risk, and Compliance Book of Knowledge
sponsored by ServiceNow
EBOOK: Governance, risk, and compliance (GRC) is becoming a staple when it comes to risk management and meeting regulatory requirements. Read on to unlock the Governance, Risk, and Compliance Book of Knowledge and discover why organizations are opting for GRC tools and the benefits they’re realizing.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

ServiceNow

Would You Bet Your Business On the Strength of Every Employee’s Password?
sponsored by Panda Security
EBOOK: Password misuse and reuse present way too big a risk for password ‘use’ in general. Plus, passwords are not hard to obtain if you have the right hacking skill set – and they’re sought after, running for about $160 apiece on the dark web. If you’re searching for an alternative to passwords, check out this e-book on two-factor authentication.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 12 Oct 2020 | Published: 21 Jul 2020

ServiceNow

Learning from COVID-19: Security and Continuity Planning
sponsored by Panda Security
EBOOK: As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

What is Okta Access Gateway
sponsored by Okta
VIDEO: Securely connecting users to applications isn’t a new problem. Historically, organizations opted for on-premise single sign-on (SSO) tools to address this. However, SSO tools are unable to meet the security and scalability needs of today’s hybrid IT environments. Watch this video to see how Okta addresses this need.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Okta

Managing Identity So You Can Scale
sponsored by Okta
WHITE PAPER: Today’s users expect an experience that is not only frictionless and personalized, but also secure. To meet this demand, organizations are turning to customer identity and access management (CIAM) tools. Read this white paper to learn more about Okta’s CIAM offering and how it’s benefitted some of their key partners.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Okta

Technical Overview: Reducing Risk with a Remote Workforce
sponsored by SolarWinds, Inc.
WEBCAST: Working from home has drastically changed the IT security paradigm. This webinar provides an overview of those changes, highlights the current challenges and opportunities, and offers best practices for reducing risk for your remote workforce.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

SolarWinds, Inc.

Making It Safe for Your People to Work Remotely
sponsored by Forcepoint
EBOOK: Given the current global pandemic, organizations have had to rapidly enable large amounts of remote workers – without compromising productivity or security. In this eBook, Making It Safe for Your People to Work Remotely, discover the risks associated with remote work and how to effectively address them.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Forcepoint

How Fortinet Secures AWS Migrations
sponsored by Rackspace
VIDEO: In order to make the most of your organization’s AWS migration, it’s critical to make deliberate considerations when it comes to establishing security measures and assigning security responsibility. Watch this webinar to more and discover how Fortinet can help secure AWS migrations and integrations.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Rackspace

ERM & GRC: Digital Tools for Oversight In The Enterprise
sponsored by ServiceNow
WHITE PAPER: In this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

ServiceNow

Security Without Compromise: A New Approach to Eliminating Malware
sponsored by Menlo Security
WEBCAST: 50% of all cyberattacks are based in malware, and 99% of those are driven by email and web attack vectors. How can organizations stay protected? A new way to reduce threats is through a method called ‘isolation.’ Gartner estimates that by 2022, isolation can reduce end-user system attacks by 70%. Interested? Watch this webcast for a closer look.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Menlo Security

Preventing Phishing Attacks in the Digital Workforce
sponsored by Menlo Security
WEBCAST: Poor cybersecurity habits and simple employee mistakes place organizations at greater risk of credential theft and infiltration. Despite advancements in cybersecurity, phishing continues to be the number one source of breaches. Watch this webcast to learn current phishing trends of 2020 and how to prevent phishing in the digital workforce.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Menlo Security

Three Ways PKI Can Help Secure the Remote Workforce
sponsored by Sectigo
EBOOK: IT departments have found themselves under pressure to scale networks to support long-term remote work. With this scale comes a slew of network vulnerabilities that traditional identity management strategies may not be able to handle. View this in-depth e-book to learn 3 ways public key infrastructure can help protect remote workers.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo
76 - 100 of 2263 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info