Vertical Industries  >  

Security Industry

RSS Feed   
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 401 Matches Previous Page  |  Next Page
Automating Detection and Response: A SANS Review of Swimlane
sponsored by Swimlane
ANALYST REPORT: In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.
Posted: 12 Dec 2018 | Published: 12 Dec 2018

Swimlane

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

2019 Forcepoint Cybersecurity Predictions Report
sponsored by Forcepoint
WHITE PAPER: Explore the 2019 Forcepoint Cybersecurity Predictions Report to examine a collection of industry trends and threats impacting organizations in the new year.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Forcepoint

Financial Services: Managing Digital Risk and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: Open this white paper to uncover the best approaches financial institutions can take to protect against domain risks, mobile app risks, digital compliance and much more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Proofpoint, Inc.

The Forrester Wave: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018
sponsored by Cyxtera
RESEARCH CONTENT: The concept and framework of Zero Trust is booming in the security industry today. Read on to learn how 14 different Zero Trust eXtended ecosystem providers stack up.
Posted: 30 Nov 2018 | Published: 08 Nov 2018

Cyxtera

TLS 1.3: Are you Ready?
sponsored by F5 Networks
WHITE PAPER: Read this white paper to discover a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

F5 Networks

6 Steps For Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. Download this white paper to learn about IBM Resilient, and review the 6 steps to developing sophisticated and robust incident response functions.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

Automating Hybrid Cloud Security for DevOps
sponsored by Trend Micro
RESOURCE: In this resource, explore the biggest hybrid cloud security challenges, top DevSecOps use cases, the benefits of DevSecOps, and more.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

Trend Micro

6 Ways to Make Your Security Stack Work Harder
sponsored by Cisco Umbrella
RESOURCE: Discover how to amplify your existing investments to extend your security off-network, anywhere users go.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Cisco Umbrella

The Total Economic Impact™ of The Armor Complete and Armor Anywhere Solutions
sponsored by Armor
RESEARCH CONTENT: To better understand the benefits, costs, and risks associated with an investment in the Armor Complete and Armor Anywhere services, Forrester interviewed 6 Armor customers. Download this report to learn more.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Armor

The HoneyPot Project
sponsored by Armor
WHITE PAPER: Download this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses called the Honeypot Project.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

Organizations React to Security Threats More Efficiently and Cost Effectively
sponsored by Recorded Future
WHITE PAPER: While organizations may install security tools that integrate data feeds onto their network, many do not recognize what to do with the information that is coming in. In this IDC white paper, uncover the findings from interviews with 6 organizations regarding the impact of deploying a universal threat intelligence solution.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Recorded Future

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future

Employing Machine Learning in Security and UEBA: A Data-Science Driven Approach
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how machine learning can enable your team and technology to be better, smarter, and faster by having advanced analytics at its fingertips to solve real problems – like detecting User and Entity Behavior Analytics threats – quickly.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

3 Red Flags You're Not Getting the Security You Were Promised
sponsored by Cisco Umbrella
RESOURCE: Discover 3 security red flags to pay attention to when choosing a DNS security provider.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Cisco Umbrella

How You Can Use the Dark Web for Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Deciphering the terminology around what the dark web is or isn't can be confusing. Learn how to better understand the dark web, the potential benefits of information gathered from these anonymous communities, and how it can be used to produce valuable threat intelligence.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
sponsored by Recorded Future
EBOOK: It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. Continue reading to learn how threat intelligence can help everyone in cybersecurity anticipate problems, respond faster to attacks, and make better decisions on how to reduce risk.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

Integrated Security Management
sponsored by Skybox Security
RESOURCE: Learn how you can understand network connectivity, simulate attack vectors, and model your attack surface with an integrated cybersecurity management platform.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Skybox Security

The Black Market Report: A Look Inside the Dark Web
sponsored by Armor
WHITE PAPER: In this report, gain insight into dozens of dark web and underground markets with a snapshot of the types of activities threat actors are participating in every day.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Armor

Understanding Security Processes and the Need to Automate
sponsored by Skybox Security
RESEARCH CONTENT: Most organizations have room to grow in their understanding of key security and security automation processes. In this report, explore the results of an in-depth Osterman Research survey focused on understanding current security processes and how organizations are working to improve and automate them.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Skybox Security

Insider Threat to Financial Services
sponsored by Recorded Future
WHITE PAPER: Research from leading analysts at Forrester revealed that insiders accounted for 39% of data breaches through accidental and malicious misuse of data. In this white paper, explore current security technologies that are aimed at preventing and detecting insider threats, and learn about the 3 categories to understand the risks they pose.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future
1 - 25 of 401 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement