IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches Reports
 
A Next-Generation Approach to KYC
sponsored by Socure
WHITE PAPER: While KYC has become an essential practice in the fight against financial crime, programs can often be burdensome and resource intensive. This whitepaper highlights 3 essential elements required for a safe, seamless and successful KYC program – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

2020 State of SOAR Report
sponsored by Palo Alto Cortex
WHITE PAPER: Get your copy of the State of SOAR Report 2020 and see how your security team can leverage SOAR to improve, automate and securely enable your SOC.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Palo Alto Cortex

Why You Can’t Trust ‘Good Enough’ in the Age of Compliance
sponsored by WinMagic
CASE STUDY: It’s a common misconception that because servers are in the data center – and because the data is in perpetual use – that encrypting the drives ais unnecessary as the data is never at-rest. This case study highlights a financial services institution that fell into this trap – read on to get started.
Posted: 28 Dec 2020 | Published: 28 Dec 2020

WinMagic

Axis Security Video 1: Application Access Cloud
sponsored by Axis Security
VIDEO: Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.
Posted: 07 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET: As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

WinMagic

Socure ID + Intelligent KYC
sponsored by Socure
DATA SHEET: Socure ID + KYC – also known as ‘Intelligent KYC’, is highly regarded for enabling organizations to unlock massive scale in auto-acceptance and enrollment rates. But how does it stack up against the competition? Read this data sheet to find out.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Socure

A Smarter Way for Email Security + Cloud Collaboration Compliance
sponsored by Clearedin
DATA SHEET: Today’s volatile security ecosystem has left organizations scrambling to compliantly secure their email servers. And with the cloud seeing so much use, it can be difficult to know which software will keep you out of the woods. In this solution brief, you can explore how Clearedin is helping businesses to compliantly collaborate in the cloud.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Clearedin

Securing Your Remote Workforce with Okta and Palo Alto Networks
sponsored by Palo Alto Networks
WEBCAST: We are in the new normal – organizations are having to deal with more cyberthreats than ever before, and security is changing as a result. Join industry experts in this webinar as they discuss the specific security challenges facing organizations with distributed or remote workforces and how they can address them with a zero-trust model.
Posted: 04 Jan 2021 | Premiered: Jan 4, 2021

Palo Alto Networks

Helpful Answers to Your SASE-est Questions
sponsored by Netskope
WHITE PAPER: Businesses large and small are seeing the cost benefits of moving to a cloud-native control point, with the security posture and risk management tools they need. With that in mind, they still have questions and want clarity about SASE as a concept. In this article, peer through some of the most popular questions (and answers) about SASE.
Posted: 08 Jan 2021 | Published: 18 Dec 2020

Netskope

Virtualization-Based Security - External Key Management
sponsored by Thales
WHITE PAPER: Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Their mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field. Scan this white paper to get a closer look at TCT and their enterprise cryptographic key manager.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info