Vertical Industries  >  

Security Industry

RSS Feed   
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 364 Matches Previous Page  |  Next Page
Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT: Based on the research from the Ponemon Institute, organizations can face millions of dollars in revenue loss from web application attacks and denial-of-service (DoS) attacks. Read on to learn some of the key findings and trends of these attacks.
Posted: 15 Oct 2018 | Published: 30 Sep 2017

Akamai Technologies

Best Practices for Choosing an Endpoint Detection and Response (EDR) Solution
sponsored by Bitdefender
VIDEO: With the increase in employee mobility and the use of off-premise endpoints, organizations need advanced threat detection and response tools to assist them. In this webinar, explore how an endpoint, detection and response (EDR) system can help combat threats and how to choose the right one for your organization.
Posted: 11 Oct 2018 | Premiered: 05 Oct 2018

Bitdefender

Considerations for EDR Adoption
sponsored by Bitdefender
RESEARCH CONTENT: Navigate through the issues surrounding endpoint detection response (EDR), explore the business value of its adoption, and learn recommendations for the range of considerations and next steps in the decision-making process. Download to learn more.
Posted: 10 Oct 2018 | Published: 30 Sep 2018

Bitdefender

Fileless Attacks
sponsored by Bitdefender
RESOURCE: Cybercriminals don't have to use malware files anymore to achieve a successful data breach or attack. Fileless or zero-footprint attacks are growing in popularity, today. Why? Read on to find out.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Bitdefender

Why Your Traditional Endpoint Security May be Putting You at Risk
sponsored by Fortinet, Inc.
RESOURCE: According to a recent study, 63% of organizations are unable to monitor endpoint devices when they leave the corporate network. Download this white paper to learn more shocking statistics that will make you rethink your organization's traditional endpoint security practices.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Fortinet, Inc.

Six Multi-Cloud Myth Busters to Keep Businesses Secure
sponsored by Dimension Data
WHITE PAPER: Technological misconceptions are common among businesses, and can inadvertently prompt the wrong cloud implementation decisions. To avoid this happening within your company, read about 6 common multi-cloud myths and clear up any false information you may have learned.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Dimension Data

Transitioning from Managed Services to Managed Security
sponsored by AlienVault
WHITE PAPER: Download this white paper for a discussion, from two security experts, on the current state of the market for MSSPs and best practices for new MSSPs.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

AlienVault

Determining if You've Outgrown Your First-Gen Sandbox
sponsored by Fortinet, Inc.
WHITE PAPER: It's critical to ensure you have a sandbox that can keep up with the increased volume and sophistication of new threats. Read this whitepaper to learn how to choose an effective and efficient sandbox solution.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Fortinet, Inc.

Jargon Buster Guide to Post Quantum Cryptography
sponsored by ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

ComputerWeekly.com

4 Questions IT Leaders Need to Ask About Server Security
sponsored by Dell EMC and Intel®
RESOURCE: Successful IT Transformation begins with embedded end-to-end server security. In this infographic, you'll find 4 essential questions to ask to ensure that you partner with a security leader that will protect your servers from a malicious attack. Download now to learn more.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell EMC and Intel®

Cloud Networking: What Every IT Pro Needs To Know
sponsored by SearchNetworking.com
EBOOK: Speed or security? Cloud networking often requires balancing the two. Read this handbook to learn how you can have both speed and security.
Posted: 10 Sep 2018 | Published: 14 Sep 2018

SearchNetworking.com

Malware or Maleficent? Take This Quiz to Find Out
sponsored by Cisco Umbrella
WHITE PAPER: Take this quiz to learn about a security platform that uses the internet's infrastructure to block malicious destinations before a connection is ever established.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Healthcare Security: How You Can Ward Off Insider Threats
sponsored by Cisco Umbrella
EGUIDE: One of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.
Posted: 05 Sep 2018 | Published: 04 Sep 2018

Cisco Umbrella

The Cloud Security Journey for the University of Oklahoma
sponsored by Cisco Umbrella
WEBCAST: Watch this webcast to learn why University of Oklahoma chose Cisco Cloudlock and Umbrella to protect their highly sensitive and heavily regulated data in the cloud and on prem.
Posted: 04 Sep 2018 | Premiered: Mar 31, 2018

Cisco Umbrella

The Rise of the Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: Implementing a secure internet gateway (SIG) can help you monitor and prevent malicious traffic from entering or leaving your organization's network. Download this white paper to learn more about SIGs and the secure features they can bring to your organization.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

GDPR Compliance for Dummies
sponsored by Informatica
EBOOK: The challenges of GDPR are real, but luckily, technology solutions have been created to help you not only comply but thrive in today's data-centric world. Download this GDPR Compliance for Dummies e-book for insight into how GDPR can affect your organization's data, what enforcement looks like, and how to turn this challenge into an opportunity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Informatica

Containers: Making security and business sense
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

Disrupting Security: Revamping IT Security Through SecOps and Incident Management
sponsored by PagerDuty
EBOOK: Learn how SecOps is revolutionizing security management and how organizations can adopt it in order to meet the security threats of today, as well as those they'll face tomorrow. Keep your organization's name out of the next headline involving a major security breach.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

PagerDuty

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
ANALYST REPORT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create chaos for the cybersecurity team and IT organizations in general. Uncover survey findings from 300 CISOs and CSOs, and more.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Fortinet, Inc.

Aiming for a Flawless Approach to Fraud
sponsored by Riskified
RESEARCH CONTENT: Take a look inside this report to learn more about insights into cosmetics shopping patterns and fraud trends, and best practices for effectively handling transactions without compromising users' shopping experience and safety.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Riskified

Definitive Guide to Data Loss Prevention
sponsored by Digital Guardian
RESOURCE: As security pros struggle with how to keep up with non-stop threats from every angle, a 10+ year old technology, data loss prevention (DLP) is hot again. Take a look at this 67-page guide for a better understanding about DLP technologies and how the 10+ year old technology has evolved.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

Digital Guardian

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint, Inc.
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Why GDPR is Nothing to Fear
sponsored by FireMon
WHITE PAPER: Download this guide for the steps your organization can take to maintain compliance with GDPR regulations and fortify consumer trust.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

FireMon

Digital Forensics And Incident Response Service Providers
sponsored by BCM One - Verizon
ANALYST REPORT: This Forrester report compares 14 of the most significant digital forensics incident response service providers and helps security and risk professionals make the right choice.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

BCM One - Verizon

Taking a Page from the Hackers’ Handbook: The Power of Human Expertise
sponsored by Rackspace Microsoft
RESOURCE: Learn about Rackspace's managed security services and how they built their hand-selected team of active security analysts to help businesses fight back against today's cyberthreats.
Posted: 07 Aug 2018 | Published: 08 Feb 2018

Rackspace Microsoft
1 - 25 of 364 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement