Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
76 - 100 of 1952 Matches Previous Page  |  Next Page
Claroty Continuous Threat Detection Demo
sponsored by Claroty
WEBCAST: Continuous threat detection (CTD) allows for efficient security with minimal complexity compared to traditional threat detection tools. In this webinar, IT leaders at Claroty discuss the importance of total visibility for data acquisition and provide an in-depth demo of their new dashboard. Continue to watch the demo.
Posted: 18 Nov 2019 | Premiered: Nov 18, 2019

Claroty

How Barclays Improved IT Security with the Tanium Communications Architecture
sponsored by Tanium
CASE STUDY: Global banks face increasing regulatory pressure, and Barclays, with over 300,000 endpoints across 40 countries, is no exception. Barclays needed a way to unify these endpoints and speed up incident response time. In this case study, follow Barclays’ IT security journey.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium

IBM QRadar On Cloud
sponsored by IBM
DATA SHEET: Companies are looking to outsource their cybersecurity environments in favor of cloud-based application. In this guidebook from Nucleus Research, uncover the challenges faced by security leaders and go in-depth into the benefits of IBM QRadar on Cloud (QRoC), a SIEM-as-a-service offering.
Posted: 15 Nov 2019 | Published: 31 Jul 2019

IBM

Strengthen your Financial API Security
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper highlights several areas of concern around API security within your financial enterprise, including access control, data governance and consent management, visibility into the activity of your applications, auditing and forensics. Read on to gain a deeper understanding of API security threats and how to build a solid defense.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Ping Identity Corporation

How to Address Privacy Regulations and Keep Your Data Safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Forescout

Review of Security Information and Event Management Vendors
sponsored by IBM
ANALYST REPORT: Discover an in-depth evaluation of leading SIEM technologies in Gartner’s Magic Quadrant for Security Information and Event Management. This detailed report describes strengths, weaknesses, and recommendations for each.
Posted: 15 Nov 2019 | Published: 03 Dec 2018

IBM

Top 5 Myths About SIEM
sponsored by IBM
WHITE PAPER: Traditionally, SIEM solutions were complex and targeted towards larger organizations. But with the need for security solutions ever-increasing, progressive SIEM vendors cater to businesses of all sizes.In this white paper, uncover the top 5 myths about SIEM and what organizations should expect from SIEM today. Read on to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

Connecting Everything and Everyone
sponsored by Nokia
WHITE PAPER: The number of IoT connected devices is increasing and the market opportunities have encouraged many operators to become IoT service providers. However, this transition brings the challenge of connecting and managing these devices. In this white paper, learn how Nokia Impact can help your organization manage every device from a single platform.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Nokia

Reducing Risks from IoT Devices in an Increasingly Connected World
sponsored by Forescout
WHITE PAPER: With the rise of automation, remote access, and the ever-expanding Internet of Things, IT and OT teams are collaborating at an unprecedented rate to strengthen organizational network security. While these devices offer a number of enhancements to our lives, they also introduce new threats. Read on to learn how you can combat IoT threats today.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Forescout

IBM Identity and Access Management Services: Costs and Benefits
sponsored by IBM
WHITE PAPER: Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.
Posted: 14 Nov 2019 | Published: 30 Jun 2019

IBM

Worldwide Security Information and Event Management Market Shares
sponsored by Splunk
ANALYST REPORT: According to IDC, the worldwide SIEM software market grew to $3.0 billion in 2018, a 12.4% increase year-over-year. The growth is a response to an organization's need to monitor, investigate and respond to security threats. Download the report to learn more and see what’s ahead for 2020.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Splunk

The Dark Side of the API Economy
sponsored by Ping Identity Corporation
WHITE PAPER: Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners. Collectively this emerging trend is referred to as the API Economy. In this white paper, KuppingerCole Analysts provide key recommendations on designing a comprehensive and future-proof API security strategy.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Ping Identity Corporation

Access Management Vendors: Analyst Report
sponsored by IBM
RESOURCE: SaaS-delivered access management has become the norm, and vendors are including API capabilities for integrating authentication and authorization into applications and services. Gartner recently published a Magic Quadrant report for Access Management, which evaluates and compares various AM providers. Read on to learn more.
Posted: 14 Nov 2019 | Published: 12 Aug 2019

IBM

CCPA and Identity Verification
sponsored by IDology
WHITE PAPER: As 2020 approaches, companies should view CCPA as an opportunity to further engage with their customers, rather than an obstacle. In order to adhere to the requirements, implementing policies that follows the CCPA timeline is imperative.Download this whitepaper to discover why identity verification is so critical to ensuring compliance.
Posted: 14 Nov 2019 | Published: 12 Nov 2019

IDology

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

The Internet of Things (IoT) in a Smart Building
sponsored by Forescout
RESOURCE: When discussing IoT, the definition of what these “things” are can be fuzzy. The IoT also overlaps with previous concepts. To help clarify, this infographic provides an illustration of IoT devices found within a typical smart building network and shows how the systems communicate with one another.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Forescout

Automating Identity & Access Management
sponsored by Hitachi ID
WEBCAST: Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.
Posted: 14 Nov 2019 | Premiered: Feb 28, 2019

Hitachi ID

Future-Proofing Your Information Security Strategy
sponsored by InteliSecure
WHITE PAPER: In this guide, Jeremy Wittkop, Chief Technology Officer, explains why security leaders should start pivoting their security strategies to emphasize the 2 elements of security that are not likely to be diminished: people and data. Read on to learn more about what he thinks really matters in the future of security and what you can do about it now.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

InteliSecure

Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform
sponsored by enSilo
WHITE PAPER: With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.
Posted: 13 Nov 2019 | Published: 31 Mar 2018


Guide to Understanding Ransomware
sponsored by enSilo
WHITE PAPER: Ransomware is an increasingly popular tactic used to steal data and disrupt a system’s operations. In enSilo’s Guide to Understanding Ransomware, discover everything you need to know about protecting and defending against ransomware.
Posted: 13 Nov 2019 | Published: 13 Nov 2019


3 Key Capabilities for Next-Generation Identity and Access Management
sponsored by IBM
WEBCAST: Traditionally, identity and access management (IAM) was designed by engineers, for engineers to be customizable and siloed. Next-generation IAM’s goal is to enhance security by improving on these methods. Explore the IAM “as a service” delivery model and uncover it’s 3 key capabilities. Continue to this webinar to learn more.
Posted: 13 Nov 2019 | Premiered: Nov 13, 2019

IBM

Client Insights on Data Protection with IBM Security Guardium
sponsored by IBM
ANALYST REPORT: How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.
Posted: 13 Nov 2019 | Published: 31 Aug 2019

IBM

Discover Hidden API Security Vulnerabilities and How to Defend Against Them
sponsored by Ping Identity Corporation
WHITE PAPER: Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ping Identity Corporation
76 - 100 of 1952 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement