Vertical Industries  >  

Security Industry

RSS Feed   
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 383 Matches Previous Page  |  Next Page
Future of the SOC - SOC People: Skills, Not Tiers
sponsored by Chronicle
WHITE PAPER: We’ve entered a new phase of the digital revolution. Network edges are extended to a point of entanglement with the physical world, expanding hybrid cloud and an increasingly multi-cloud core—all of which necessitates a rethinking of the SOC workforce model. Access this white paper to see the prospective focus on SOC talent.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Chronicle

What is the Shared Responsibility Model?
sponsored by Horangi
WHITE PAPER: Cloud service providers often talk about cloud security as being the responsibility of both the customer and the vendor. This is known as the ‘Shared Responsibility’ model, and its aim is to reduce risk by dividing labor between the two parties. Read this short article to learn the ‘what’, ‘why’ and ‘how’ of shared responsibility.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Horangi

13 Compliance Frameworks For Cloud-Based Organizations
sponsored by Horangi
WHITE PAPER: The need for cloud compliance begins as soon as you build on the cloud. Considering the shared responsibility of cloud security, which are the regulatory frameworks that you need to be aware of? Leverage this article to get an in-depth look at 13 of them, broken down by cloud vendor, security framework, industry and location.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Horangi

2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT: Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

DomainTools

Understand the OWASP Top 10 & How WAFs Can Mitigate Them
sponsored by Radware
EBOOK: Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Radware

Application Security Stats Flash
sponsored by WhiteHat Security
ANALYST REPORT: API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

WhiteHat Security

Market Guide for Zero Trust Network Access
sponsored by Akamai
WHITE PAPER: If your organization is looking to augment its VPN or even pilot a SASE strategy to rapidly expand remote access, then you’ve probably heard about zero-trust network access (ZTNA). In this Gartner market guide, explore key findings about ZTNA, recommendations for security and risk leaders and a list of representative vendors of ZTNA.
Posted: 26 Jan 2021 | Published: 08 Jun 2020

Akamai

How to Scale Your IoT Solution
sponsored by Aeris
EBOOK: With so many endpoints to watch over, leveraging of cloud architecture and rapidly developing security threats in play, scaling your IoT solution can be a complex endeavor. By reading this guide, you will learn common issues that customers face as they scale and how a sophisticated IoT connectivity provider can help you overcome them.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Aeris

The True Cost of a DDoS Attack
sponsored by Radware
WHITE PAPER: Many executives make the mistake of viewing cybersecurity strictly as a cost center. Organizations must reevaluate how the balance investment vs. risk equation and alter how and when they implement cybersecurity. In this Radware guide, learn the true cost of a DDoS attack, and see why it makes sense to invest now, not pay later.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Meeting NIST SP 800-207 with CyberArk
sponsored by Merlin International
RESOURCE CENTER: Embracing a Zero Trust security model is the official recommendation of the US House of Representatives – but how can US federal agencies align their methods with Zero Trust best practices? Read this report to learn about the core tents of the NIST Zero Trust Architecture (ZTA) and how agencies should work towards implementation.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

Secure Remote Access solutions: A Buyer’s Guide
sponsored by Redcentric Solutions Ltd
EBOOK: Businesses are on a limb when it comes to risk management. Getting employees online in a safe manner is a frequent conversation piece, and security professionals hear about it every day. It’s time to give your employees the best secure remote experience possible. Leverage this white paper to learn how to remove risk from remote access.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Redcentric Solutions Ltd

The Technology behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Why Security is Now a Critical Component of Application Delivery
sponsored by Radware
WHITE PAPER: Because today’s threats can be so costly, combining application protection with application delivery has become mission-critical. Radware Alteon is an application delivery solution that integrates web application firewall (WAF), bot management and automation to ensure apps stay secure. Jump into this solution brief for a product overview.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Implementing a Hybrid Cloud Using Security & Compliance Automation
sponsored by Red Hat
WEBCAST: Maintaining visibility, control and security while ensuring governance and compliance is paramount. This becomes more difficult and arduous in a hybrid infrastructure consisting of physical, virtual, cloud and container environments. Watch this webinar to see how Red Hat can help you with these challenges by automating security and compliance.
Posted: 22 Jan 2021 | Premiered: May 14, 2020

Red Hat

The Fidelis Threat Intelligence Toolkit is Here
sponsored by Fidelis
RESOURCE: Organizations are struggling to keep up with threat actors as they engage different vectors and develop their toolkit of attacks. It seems only fair, then, that you have a toolkit of your own. Click here to access your Fidelis Threat Intelligence Toolkit. Leverage the latest cybersecurity news and know what’s on the prowl and how to defend.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Fidelis

Avoiding the Crippling Effects of Ransomware through Early Detection & Response
sponsored by Fidelis
PODCAST: Ransomware remains high on the list of security concerns for enterprises, CISOs and CIOs. But early detection can help your organization, and it’s key in avoiding significant damage and cost. Tune into this podcast to hear former NSA CISO Chris Kubic as he discusses why ransomware is so dangerous and how to protect against it.
Posted: 21 Jan 2021 | Premiered: Jan 21, 2021

Fidelis

Financial Grade APIs Using OAuth and OpenID Connect
sponsored by Curity AB
WHITE PAPER: OAuth and OpenID Connect are international standards that define methods for securing APIs. They carry much weight when it comes to financial compliance. In this white paper, explore various aspects of OAuth and OpenID Connect that can be used to conform to the revised Directive on Payment Services (PSD2) and the GDPR.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

The API Security Maturity Model
sponsored by Curity AB
EBOOK: API security has become a forefront issue for modern enterprises. Many API security implementations exist, but not all are effective. How can you ensure that your APIs are mature and secure? Download The API Security Maturity Model, which reframes the degrees of web service development maturity through a security lens.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

Fighting Hackers & Responding to Ransomware: A How-To
sponsored by Fidelis
EGUIDE: Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.
Posted: 20 Jan 2021 | Published: 15 Jan 2021

Fidelis

How to Protect Your Organization with Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
WEBCAST: Security is spreading its wings. SD-WAN and cloud-based security are both being adopted at a high rate, and this adoption begins with conversations about cyber risk. Because security talent is in short supply, professionals need to find ways to fend off threats. Watch this webcast for a live demo of AT&T’s Managed Threat Detection and Response.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

AT&T Cybersecurity

OAuth and OpenID Connect - What's Next?
sponsored by Curity AB
WEBCAST: The OAuth 2.0 framework has provided identity professionals open standards for authenticating users, but the world is now mobile, and the way apps are being built is changing. OpenID Connect by Curity is an identity layer on top of the current OAuth protocol that is API-ready for a remote workforce. Watch this webcast to see why this matters now.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

Curity AB

Vendor Comparison and Analysis: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

Zero trust: Taking back control of IT security
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 18 Jan 2021 | Published: 18 Jan 2021

ComputerWeekly.com

AT&T Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET: Threat detection is one of the fastest-growing areas in cybersecurity, but talent is in short supply, leaving organizations to do more with less resources. And as cybercriminals become cleverer, the burden falls to the business to counter threats. Examine this data sheet to explore Managed Threat Detection and Response from AT&T.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

AT&T Cybersecurity

Consistent Security Posture, Firewalls in Minutes and Reduced Latency – Autodesk’s Cloud Transformation Story
sponsored by Fortinet, Inc.
WEBCAST: As part of a virtual data center project, Autodesk required that each of its Amazon Virtual Private Cloud (VPC) instances had its own firewall. That was a large task due to the hundreds of VPCs Autodesk has. In this webinar, learn how Fortinet’s Virtual Next-Gen Firewall consistently manages their security posture across all Amazon VPCs.
Posted: 15 Jan 2021 | Premiered: Oct 20, 2020

Fortinet, Inc.
1 - 25 of 383 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info