Vertical Industries  >  

Security Industry

RSS Feed   
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 200 Matches Previous Page  |  Next Page
Reinvent Endpoint Security with Management Print Services
sponsored by HP
PRODUCT OVERVIEW: Download this white paper to learn about HP Secure Managed Print Services (MPS), and how they simplify print security by assessing risks, securing and managing your fleet, maintaining printer security compliance, and keeping everything up-to-date with the latest protections.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

HP

SIEM Buyer's Guide
sponsored by HelpSystems
RESOURCE: It's no longer possible for organizations to use manual analysis to detect intrusions or protect against IT risks. That's why some organizations are using SIEM software to help them handle the job. In this SIEM Buyer's Guide, find key features to look for in SIEM software, cost considerations, requirements checklist, and much more.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

HelpSystems

NPMD for Network Security Forensics
sponsored by Viavi
WHITE PAPER: Download this white paper to learn about network performance monitoring and diagnostics (NPMD) and network forensics and how they can help strengthen protection against ever-increasing cyberattacks, malware, and internal espionage threats.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Viavi

UniCredit Delivers Omni-Channel Excellence With Real-Time Operational Insights
sponsored by Splunk Services UK Ltd
CASE STUDY: UniCredit needed a way to collect, store and analyze machine data from multiple sites, systems and applications in order to provide optimal service for its banking customers. Download this case study to see how Splunk Enterprise allowed UBIS to do so.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

Splunk Services UK Ltd

IBM i Encryption: How to Protect Your Database
sponsored by HelpSystems
WHITE PAPER: Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

HelpSystems

How To Secure IaaS/PaaS Effectively: Customer Responsibilities in the Shared Security Model
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the impact of IaaS/PaaS on your security focus, your responsibilities under shared security models, and a security analysis of IaaS/PaaS vs. on-premise environments.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

MASERGY

Resolving the Agile vs. Secure Application Networking Tradeoff
sponsored by NetFoundry
WHITE PAPER: Read this white paper to learn about a new networking platform designed to enable secure and reliable connect applications without the constraints of VPNs, custom hardware and private circuits.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

NetFoundry

How to Separate True Threats from False Positives with Machine Learning
sponsored by ThreatX
WHITE PAPER: Today, AppSec teams have too much to analyze and not enough people to do so. In this white paper, take a look at a blended approach to security alerts and threats and see how your organization can separate true threats from false positives.
Posted: 24 Jan 2019 | Published: 24 Jan 2019

ThreatX

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

What's Threatening IT Security?
sponsored by Aruba Networks
RESOURCE: What are the causes of gaps in IT security? Is the Internet of Things making it worse? Can AI and automation fix it? Download this resource to see what the Ponemon Institute recently found.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Aruba Networks

Automating Detection and Response: A SANS Review of Swimlane
sponsored by Swimlane
ANALYST REPORT: In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.
Posted: 12 Dec 2018 | Published: 12 Dec 2018

Swimlane

The Forrester Wave: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018
sponsored by Cyxtera
RESEARCH CONTENT: The concept and framework of Zero Trust is booming in the security industry today. Read on to learn how 14 different Zero Trust eXtended ecosystem providers stack up.
Posted: 30 Nov 2018 | Published: 08 Nov 2018

Cyxtera

6 Ways to Make Your Security Stack Work Harder
sponsored by Cisco Umbrella
RESOURCE: Discover how to amplify your existing investments to extend your security off-network, anywhere users go.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Cisco Umbrella

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

3 Red Flags You're Not Getting the Security You Were Promised
sponsored by Cisco Umbrella
RESOURCE: Discover 3 security red flags to pay attention to when choosing a DNS security provider.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Cisco Umbrella

Deliver Secure, Contextual User Access on Any Device, Anywhere, Without Sacrificing IT Control
sponsored by Citrix
WHITE PAPER: Explore how you can achieve integration and secure cloud access for contextual user access management, without sacrificing IT control.
Posted: 23 Oct 2018 | Published: 23 Oct 2018

Citrix

Healthcare IT Security Evaluation Guide
sponsored by Cylance
PRODUCT LITERATURE: Healthcare IT staff plays a critical role in safeguarding PHI. Prioritizing data protection can be difficult for IT departments primarily focused on maintaining technology for vital day-to-day operations. Discover how you can protect healthcare technology by using AI to solve cybersecurity challenges.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Cylance

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: To help your team be successful with testing, implementing and scaling automation, download this e-book for 4 security automation best practices.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security orchestration and automation can make teams faster and more efficient. But, how do you measure that? Download this white paper to evaluate the return on your investments in security orchestration and automation.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

Jargon Buster Guide to Post Quantum Cryptography
sponsored by ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

ComputerWeekly.com

4 Questions IT Leaders Need to Ask About Server Security
sponsored by Dell EMC and Intel®
RESOURCE: Successful IT Transformation begins with embedded end-to-end server security. In this infographic, you'll find 4 essential questions to ask to ensure that you partner with a security leader that will protect your servers from a malicious attack. Download now to learn more.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell EMC and Intel®

Cloud Networking: What Every IT Pro Needs To Know
sponsored by SearchNetworking.com
EBOOK: Speed or security? Cloud networking often requires balancing the two. Read this handbook to learn how you can have both speed and security.
Posted: 10 Sep 2018 | Published: 14 Sep 2018

SearchNetworking.com

Malware or Maleficent? Take This Quiz to Find Out
sponsored by Cisco Umbrella
WHITE PAPER: Take this quiz to learn about a security platform that uses the internet's infrastructure to block malicious destinations before a connection is ever established.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella
1 - 25 of 200 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement