Vertical Industries  >  

Security Industry

RSS Feed   
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 323 Matches Previous Page  |  Next Page
6 Ways to Prevent Ransomware in Health IT
sponsored by Cisco Umbrella
EGUIDE: With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

How to Avoid the Top 3 Pitfalls of Reputation-Based WAF's
sponsored by ThreatX
RESOURCE: Explore 3 common pitfalls of IP/reputation blacklist feeds and how you can avoid them.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

ThreatX

Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services
sponsored by Avast Business
WHITE PAPER: Read this white paper to explore why many MSPs are beginning to offer managed security services to better serve their customers and differentiate their business. You'll learn how the threat landscape is changing, what you need to offer your clients to address these concerns for businesses of all sizes, and more.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Avast Business

3 Essential Components of a Managed Security Service for SMBs
sponsored by Avast Business
WHITE PAPER: This white paper examines the current attack surface, as well as 3 essential components that a managed security service must cover: data, devices and people. Click inside to learn how you can turn the cybercrime surge into a business opportunity.
Posted: 27 Jun 2018 | Published: 27 Jun 2018

Avast Business

Cloud Security Pros Finding their Voice
sponsored by Cavirin
EGUIDE: Find out how the DevSecOps and the NIST Cybersecurity Framework both put the long-lost co-worker, the security pro, front and center.
Posted: 21 Jun 2018 | Published: 11 Jun 2018

Cavirin

Best Practices: Protect Your Apps from Cyberattckcs
sponsored by F5 Networks
WHITE PAPER: The skyrocketing popularity of websites and web-based applications has come with a corresponding explosion in the numbers, types, magnitudes, and costs of attacks that specifically target app vulnerabilities. Continue reading to reveal who is behind the security breaches, and what you can do to protect your apps.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

F5 Networks

Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE: It's likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Akamai Technologies

What Happens When a Business Decides to Prevent Attacks Instead of React to Them?
sponsored by Cylance
VIDEO: Formel D is the global service provider for the automotive industry, where Global IT Manager Robert Osten oversees the teams responsible for building and maintaining the company's network in regards to threats. In this video, learn how Formel D used Cylance for their security needs, and how it compared to other systems they used in the past.
Posted: 12 Jun 2018 | Premiered: 23 May 2017

Cylance

Hacking Exposed - Attacker Methods and Tactics
sponsored by Cylance
WEBCAST: This webinar covers techniques used to exploit weaknesses in traditional security solutions, and the tactics and tools adversaries use to gain access to vital systems and data.
Posted: 07 Jun 2018 | Premiered: Mar 15, 2018

Cylance

Disrupting Security: Revamping IT Security Through SecOps and Incident Management
sponsored by PagerDuty
RESOURCE: Learn how SecOps is revolutionizing security management and how organizations can adopt it in order to meet the security threats of today, as well as those they'll face tomorrow. Keep your organization's name out of the next headline involving a major security breach.
Posted: 07 Jun 2018 | Published: 07 Jun 2018

PagerDuty

Advanced Endpoint Protection: Cylance Security Value Map
sponsored by Cylance
RESOURCE: In this report, find out how Cylance updated their product software and how the update impacted their security effectiveness score and protected agent value.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

Cylance

Key findings from 2017 threat analysis
sponsored by Cylance
ANALYST REPORT: This report highlights an overview of the threat trends and malware families in 2017, and uncovers key findings collected between January 1, 2016 and December 31, 2017.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Cylance

The Executive Guide to Demystifying Cybersecurity
sponsored by Radware
WHITE PAPER: Inside, find out what banks and cybersecurity have in common and learn several ways of protecting and monitoring valuable information.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

Analyzing the OWASP Top 10: Top Application Security Threats & How to Mitigate Them
sponsored by Radware
WHITE PAPER: Inside, explore an overview of changes between the 2013 and 2017 top 10 list, serving as an industry benchmark for the application security community. Uncover technical capabilities security pros should consider when evaluating web application firewalls.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

Essential Cybersecurity Training for Your Employees
sponsored by Datto, Inc.
EBOOK: Use this e-book to gain critical information on how to train your workforce on cybersecurity and internet browsing best-practices with real world examples.
Posted: 21 May 2018 | Published: 21 May 2018

Datto, Inc.

Voice of the Analyst Study: An Inside Perspective on Security Operations
sponsored by Respond Software
ANALYST REPORT: Find out why 45% say reality in the security operations centers (SOCs) does not meet expectations, and learn about the human side of the SOC to gain an understanding and insights to empower your SOC teams to be the best they can be.
Posted: 20 May 2018 | Published: 18 May 2018

Respond Software

How to Respond to a Worst-Case Cyber Scenario
sponsored by CrowdStrike
WHITE PAPER: Explore recommendations for responding to a breach, the expertise required to do so quickly and effectively, and why companies need to be prepared to identify, respond to and mitigate a targeted attack.
Posted: 16 May 2018 | Published: 16 May 2018

CrowdStrike

IT Priorities 2018 - What's happening in security?
sponsored by ComputerWeekly.com
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 02 May 2018 | Premiered: 02 May 2018

ComputerWeekly.com

Information Security: Companies Aren't the Only Ones Migrating to Cloud
sponsored by SearchSecurity.com
EZINE: Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

SearchSecurity.com

Top 9 DDoS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Use this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Radware

Responding Efficiently to Major Data Breaches
sponsored by Nuix
WHITE PAPER: In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Nuix

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
ANALYST REPORT: In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

Unified Threat Management (UTM) Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: Click inside to learn the 4 aspects that any good unified threat management (UTM) system has, as well as a buyer's checklist to make sure you have everything you need.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Fortinet, Inc.

End-User Security Survey: How Common is Confidential File Sharing?
sponsored by Dell and Microsoft
RESEARCH CONTENT: To find out how widespread the unsafe sharing of confidential data has become, Dell commissioned a global survey of 2,608 professionals who handle confidential data at companies with 250 or more employees. Click inside to learn the results.
Posted: 26 Jan 2018 | Published: 29 Dec 2017

Dell and Microsoft

Manufacturing Company Automates with Enterprise Security SIEM
sponsored by Splunk
CASE STUDY: Discover what benefits this manufacturing company gained by adopting a SIEM system to bolster their small security team.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Splunk
1 - 25 of 323 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement