Vertical Industries  >  

Security Industry

RSS Feed   
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 327 Matches Previous Page  |  Next Page
Information Security: Companies Aren't the Only Ones Migrating to Cloud
sponsored by SearchSecurity.com
EZINE: Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

SearchSecurity.com

Change Agents in the Cybersecurity Era
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: Take advantage of this opportunity and join our experts in staying up to date with cybersecurity's most pressing topics.
Posted: 13 Mar 2018 | Premiered: Mar 12, 2018

SearchSecurity.com

New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers
sponsored by Radware
RESOURCE: Click inside, and learn how Radware was able to breakdown the attack vector of the new variant of the Satori botnet into 5 steps, so that you may be better prepared to fight it should it attack your network.
Posted: 08 Mar 2018 | Published: 12 Feb 2018

Radware

Create Trusted IoT, Become the King of Sweden?
sponsored by Radware
RESOURCE: Click inside to learn about the opportunities providers have to secure vulnerabilities in IoT devices that may have been overlooked by manufacturers.
Posted: 08 Mar 2018 | Published: 25 Jan 2018

Radware

1984 to 2018: The Evolution of the Olympics
sponsored by Radware
RESOURCE: Click inside to learn how the IoT revolution impacted the 2018 PyeongChang Olympic games, as well as the challenges providers and the future host cities of the games will have to address when it comes to protecting internet connected devices and users.
Posted: 08 Mar 2018 | Published: 21 Feb 2018

Radware

Is My Smart Home Telling People What I Do Every Day?
sponsored by Radware
RESOURCE: Click inside to learn about the current state of smart home security, as well as some steps providers should take in the near future to protect their customers.
Posted: 07 Mar 2018 | Published: 13 Feb 2018

Radware

Top 9 DDoS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Use this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Radware

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017

Radware

Responding Efficiently to Major Data Breaches
sponsored by Nuix
WHITE PAPER: In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Nuix

How to Secure Your Network from Ransomware
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the trends in ransomware, from what attackers are hoping to gain, to what it costs victims. Click inside to learn about a new approach to defending against this malware through cloud-based threat analysis.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Palo Alto Networks

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
ANALYST REPORT: In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

Unified Threat Management (UTM) Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: Click inside to learn the 4 aspects that any good unified threat management (UTM) system has, as well as a buyer's checklist to make sure you have everything you need.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Fortinet, Inc.

The Five Milestones to GDPR Success
sponsored by Citrix
RESEARCH CONTENT: This Forrester Research Report details how to achieve 5 key milestones to have GDPR success by the May 2018 deadline.
Posted: 30 Jan 2018 | Published: 25 Apr 2017

Citrix

Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM
sponsored by Splunk
WHITE PAPER: Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Splunk

Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Synopsys

Comparing Security Information and Event Management Providers
sponsored by Splunk
RESEARCH CONTENT: With so many vendors on the market offering SIEM services that differ in subtle ways, how do you know which one is right for you? This Gartner Report seeks to answer that question by listing the pros and cons of 19 SIEM offerings so you can make your own informed choice.
Posted: 21 Dec 2017 | Published: 04 Dec 2017

Splunk

Next-Generation Firewalls: The Cornerstone of Future Security
sponsored by Palo Alto Networks
WHITE PAPER: Learn about one next-gen firewall that combines network, cloud and endpoint security capabilities, and enables them all with threat intelligence to help prevent cyber breaches. Read on to find 6 key abilities of this strategy.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Palo Alto Networks

Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
sponsored by Juniper Networks, Inc.
EGUIDE: This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
Posted: 01 Dec 2017 | Published: 28 Nov 2017

Juniper Networks, Inc.

The Australian Privacy Amendment Explored
sponsored by Rapid7
DATA SHEET: Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Rapid7

GDPR Compliance: How to Comply with 3 Key Articles
sponsored by Rapid7
WHITE PAPER: While it will take a collection of services and tools to get into full compliance with the new General Data Protection Regulation (GDPR), security is a key piece. In this white paper, learn about a service which can help you prepare to meet 3 of the GDPR's articles so that you are ready to face this new law on every level of your IT environment.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Rapid7

Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER: In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7

Discover a Fully Managed Detection and Response System
sponsored by Rapid7
RESOURCE: Inside this resource, learn how to simplify the procurement of security tools and staff with a suite of managed detection and response services. Read on to find out how you can gain user behavior analytics, threat intelligence based on data from over 5,000 users, and more.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7

What You Need to Know About the General Data Protection Regulation (GDPR)
sponsored by Rapid7
WHITE PAPER: In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.
Posted: 22 Nov 2017 | Published: 22 Nov 2017

Rapid7

SIEM Analyst Research Bundle
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault
1 - 25 of 327 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement