Hardware  >  

Security Hardware

RSS Feed   
DEFINITION: Computer hardware that is designed to protect its contents from attack.
Security Hardware Reports
1 - 25 of 85 Matches Previous Page  |  Next Page
Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

The Fidelis Threat Intelligence Toolkit is here
sponsored by Fidelis
RESOURCE: Organizations are struggling to keep up with threat actors as they engage different vectors and develop their toolkit of attacks. It seems only fair, then, that you have a toolkit of your own. Click here to access your Fidelis Threat Intelligence Toolkit. Leverage the latest cybersecurity news and know what’s on the prowl and how to defend.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Fidelis

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Digital transformation has emerged as a key driver to cloud migration – in fact, 83% of workloads are expected to be cloud-based by the end of the year. Securing your data as you migrate it to the cloud is essential. Read this article to learn more about common cloud migration challenges and how to protect your data in transition.
Posted: 10 Dec 2020 | Published: 28 Oct 2020

Atakama

Full Disk Encryption: Not What You Might Think
sponsored by Atakama
RESOURCE: In this article, learn why full disk encryption, an approach to securing the contents of hard drives, may not be the solution you might have thought. See how, in some cases, it could even create more security vulnerabilities for users.
Posted: 08 Dec 2020 | Published: 29 Aug 2019

Atakama

Boost hybrid cloud security
sponsored by Red Hat
EBOOK: As security evolves, so too do threats. In a world that is quickly moving to cloud architectures (94% of organizations are using some type of cloud), security has never been prioritized more. The cost-saving benefits of cloud are all proven, but without the right security, the risk is not worth the gain. Dive into this e-book to learn more.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

Red Hat

Managing Security Risk and Compliance in a Challenging Landscape
sponsored by Dell Technologies and Intel
RESEARCH CONTENT: How can you keep your business secure that amid the proliferation of devices and data? It starts with a trusted technology partner. Download this research report to learn why a trusted partner is key to a successful security strategy.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

Dell Technologies and Intel

MSPs: The 5 essentials from your endpoint security partner
sponsored by Malwarebytes
EBOOK: When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

Secure SD-WAN: the launch pad into cloud.
sponsored by Barracuda
WHITE PAPER: Most organizations intend to leverage the many benefits of SD-WAN, including stronger security, better performance, improved user experience and cost optimization. However, like many emerging technologies, SD-WAN does not come without its challenges. In this research report, explore adoption trends of SD-WAN across the globe.
Posted: 23 Jun 2020 | Published: 30 Jun 2020

Barracuda

RSA Conference 2020 guide: Highlighting security's human element
sponsored by ComputerWeekly.com
EGUIDE: The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
Posted: 04 May 2020 | Published: 04 May 2020

ComputerWeekly.com

The Business Guide to Ransomware
sponsored by Datto, Inc.
EBOOK: Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

Datto, Inc.

Ransomware Made MSPeasy
sponsored by Datto, Inc.
EBOOK: Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

ComputerWeekly.com

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Barracuda

CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

Spear Phishing: Top Threats and Trends Vol. 1
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 28 May 2019 | Published: 31 Mar 2019

Barracuda

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Security Analytics:A popular addition to cyber defence arsenals
sponsored by ComputerWeekly.com
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

ComputerWeekly.com

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

4 Tech Disruptors that Could Radically Change Security Operations
sponsored by SearchSecurity.com
EZINE: Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
Posted: 01 Aug 2017 | Published: 01 Aug 2017

SearchSecurity.com

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks
1 - 25 of 85 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences