Vertical Industries  >  

Security Equipment Industry

RSS Feed   
Security Equipment Industry Reports
 
Deep-Dive into MLPS 2.0 Compliance with Alibaba Cloud Solution
sponsored by Alibaba Cloud
WEBCAST: As of Dec. 1, 2019, China has introduced a new version of their multi-level protection scheme law known as MLPS 2.0. As such, the Chinese government has updated its pre-existing requirement that individual 'network operators' in China must implement and maintain an MLPS with respect to their networks. Watch this webcast to get more details.
Posted: 17 Aug 2020 | Premiered: Aug 17, 2020

Alibaba Cloud

Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
RESOURCE: Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

A Web of Weak Spots: Securing Your Supply Chain with NDR and Collective Defense
sponsored by IronNet
WHITE PAPER: Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

IronNet

Pragmatic Zero Trust
sponsored by Capgemini
RESOURCE: There is no consistent view of what ‘zero trust’ means in practice, particularly now that vendor marketing teams have the term firmly within their sights and intend to label everything ‘zero trust’ as a result. Read this short blog post to cut through the marketing hype and learn the history, nature, and possible future of ‘zero trust.’
Posted: 08 Sep 2020 | Published: 23 Jan 2020

Capgemini

Selecting Your Next-Generation Firewall Solution
sponsored by Fortinet, Inc.
WHITE PAPER: As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this NGFW white paper so that you may approach your CISO with a well-informed recommendation.
Posted: 06 Aug 2020 | Published: 06 May 2020

Fortinet, Inc.

PRIVILEGED ACCESS MANAGEMENT (PAM) AS A SERVICE FOR DUMMIES, CYBERARK SPECIAL EDITION
sponsored by CyberArk Software, Inc
EBOOK: Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

CyberArk Software, Inc

The Cost of Insider Threats: Global Report
sponsored by IBM
ANALYST REPORT: The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

IBM

Decade of the RATs
sponsored by BlackBerry
ANALYST REPORT: The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report as well as different types of remote access trojans (RATs) and what they look like.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

BlackBerry

Proofpoint CASB Adaptive Access Controls
sponsored by Proofpoint
DATA SHEET: Cloud-based networking has enabled never-before-seen flexibility, but the vulnerability of the cloud and the now-widespread use of unmanaged devices has driven security risk through the roof. A CASB is a viable option to help mitigate this risk. Browse this solution brief to understand the technology behind CASB and why it is gaining popularity.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Proofpoint

Assessing the Economic Impact of Cybereason
sponsored by Cybereason
ANALYST REPORT: As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.
Posted: 25 Aug 2020 | Published: 29 May 2020

Cybereason
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info