Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Security Budgets

RSS Feed   
Security Budgets Reports
 
The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori

Unboxing CSPM As The Answer To IaaS Security Risks
sponsored by Horangi
RESOURCE: From lack of controls and misconfiguration to cloud sprawl, there are several cybersecurity risks facing organizations migrating to the cloud. Cloud Security Posture Management (CSPM) tools can help, but it may not be ideal for your organization. Read this article to learn about cloud risks, the benefits of CSPMs and who should use them.
Posted: 03 Feb 2021 | Published: 03 Feb 2021

Horangi

Key Steps in Defining a Shared Responsibility Model for Public Cloud Services
sponsored by Alert Logic
WHITE PAPER: As public cloud has become more widely adopted, cybercriminals have altered their tactics to exploit cloud environments. Read this e-guide to discover how (and why) to implement the Shared Responsibility Model for public cloud services.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Alert Logic

Market Guide for Insider Risk Management Solutions
sponsored by Proofpoint
RESEARCH CONTENT: Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Use this Gartner Market Guide to understand and implement insider risk mitigation.
Posted: 11 Feb 2021 | Published: 29 Dec 2020

Proofpoint

How Cyberattack Simulations Differ From Penetration & Vulnerability Tests
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

5 Questions To Ask Your Security Platform Vendor
sponsored by Cisco
DATA SHEET: The market for security platforms has become oversaturated with a wide array of vendors. This can make it a difficult process for organizations evaluating their options. To help get your started, this datasheet offers 5 key questions your organization should be asking potential security platform vendors – read on to get started.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Cisco

2020 Remote Workforce Security Report
sponsored by Okta
RESEARCH CONTENT: Enabling and securing a remote work posed significant challenges to the IT teams responsible. This research report highlights those specific challenges – from internal operational hurdles to external threats – as well as impacts that went beyond security. Read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

Simplify Your Security Experience
sponsored by Cisco & NWN
DATA SHEET: SecureX was designed to help organizations improve their security operations by reducing time spend on manual tasks and identifying threats. This infographic provides key insights and responses from a recent survey into SecureX users, highlighting their usage and testimonials – read on to get started.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Cisco & NWN

SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material
sponsored by Thales
CASE STUDY: As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Thales

CyberArk Privileged Access Security for U.S. Federal Government Agencies
sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info