Vertical Industries  >  

Security Industry

RSS Feed   
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry Reports
1 - 25 of 223 Matches Previous Page  |  Next Page
How Next-Gen Networking Technologies Improve Security
sponsored by Verizon
WEBCAST: 69% of organizations claim that their network management team finds it challenging to balance availability and security. Additionally, data security improvement is reported to be most important among network strategists. This webcast may help you to stay ahead of the curve. Topics include security awareness, business continuity, and SD-WAN.
Posted: 09 Jul 2020 | Premiered: Jul 9, 2020

Verizon

You've Got BEC!
sponsored by Proofpoint
EBOOK: BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Proofpoint

MSPs: The 5 Essentials from Your Endpoint Security Partner
sponsored by Malwarebytes
EBOOK: When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

Kaspersky Lab’s COVID-19 Relief Initiatives
sponsored by Kaspersky Lab
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020

Kaspersky Lab

MSP best practices for securing servers
sponsored by Malwarebytes
DATA SHEET: Servers are the backbone of any managed service provider (MSP) making them a major target for spyware and ransomware. Access this data sheet to learn 4 best practices for securing your servers to ensure your organizations critical information is safe from online attackers.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

Proactive Security: Software vulnerability management and beyond
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

Enhancing Security Automation
sponsored by TITUS
DATA SHEET: Download the following solution overview to discover how Titus’s security automation tools are equipping enterprises with the confidence to make accurate and effective data security decisions, bring context to cloud security policies, and more.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

TITUS

Data Security: Best Practices for Remote Workers
sponsored by TITUS
WEBCAST: How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.
Posted: 26 Jun 2020 | Premiered: Jun 26, 2020

TITUS

Innovation Insight for Extended Detection and Response
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an overview of XDR and weigh its pros and cons to decide whether it could be an effective solution for your organization.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Trend Micro

5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile
sponsored by NowSecure
RESOURCE: Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.
Posted: 25 Jun 2020 | Published: 25 Sep 2019

NowSecure

Doing DevSecOps Right: Implementation & the Metrics that Matter
sponsored by Capsule8
WEBCAST: DevSecOps is a crucial part of an emerging security and IT strategy, one which realizes that security has to be implemented early, often, and in a more flexible manner. But how can your company adopt these practices, and then measure their effectiveness? Watch this Capsule8 video to learn some effective DevSecOps principles and metrics.
Posted: 25 Jun 2020 | Premiered: Apr 8, 2020


Secure remote access with zero trust
sponsored by Merlin International
WHITE PAPER: Although all most all federal employees are working from home during the COVID-19 pandemic, federal agencies are still face issues regarding network security. Access this white paper to learn strategies for securing workloads, legacy systems, and remote access and discover the 7 benefits this can lead to for federal agencies.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Merlin International

2020 Cost of Insider Threats Global report
sponsored by Proofpoint
ANALYST REPORT: Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

Proofpoint

The Evolution of Ransomware - Threat Intelligence Observations for 2020 and Beyond
sponsored by Crowdstrike
WEBCAST: Attend this webcast to learn about the ransomware cyber threat landscape, using strategic, operational and tactical assessments to shine lights on points of exposure, and how technical knowledge, intel, threat hunting and partners can help pave the way forward.
Posted: 22 Jun 2020 | Premiered: Jun 22, 2020


The Ultimate Cybersecurity Guide for the IT Professional
sponsored by VMware International Unlimited Company
EBOOK: Whether you've been in IT for a long time or are just starting out, there is an expectation that everyone in IT should have some degree of exposure to InfoSec. Tap into this comprehensive guide on the basics of cybersecurity to help you get started.
Posted: 11 May 2020 | Published: 11 May 2020

VMware International Unlimited Company

RSA Conference 2020 guide: Highlighting security's human element
sponsored by ComputerWeekly.com
EGUIDE: The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
Posted: 04 May 2020 | Published: 04 May 2020

ComputerWeekly.com

Assess and Manage Cryptographic Security with Entrust Datacard™
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: In this data sheet, take a closer look at the key features and capabilities of AgileScan, one of Entrust Datacard’s offerings focused on ensuring the security of cryptographic inventories and life cycles. Read on to learn more about AgileScan.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Entrust, Inc.

The Right Roles for SIEM and EDR
sponsored by Cybereason
WHITE PAPER: While most organizations recognize the need for security incident response and threat hunting, many are uncertain how to go about configuring a setup that meets their needs. In this white paper, explore the and benefits of configuring SIEM technologies with new tools like EDR and SOAR.
Posted: 21 Apr 2020 | Published: 22 Apr 2019

Cybereason

End-to-End Security Solutions for Mid-Market Businesses
sponsored by Dell Technologies and Intel
WEBCAST: Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020

Dell Technologies and Intel

2020 Global Threat Report
sponsored by Crowdstrike
WHITE PAPER: Each year, the CrowdStrike Intelligence team releases a report of their findings from looking into cyberattack trends and emerging adversaries over the previous year. This year’s report examines key trends in ransomware and eCrime as well as an overview of state-sponsored adversaries and their suspected motives.
Posted: 08 Apr 2020 | Published: 08 Apr 2020


The 4 Levels of Automated Remediation
sponsored by Egress Software Technologies Inc
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Egress Software Technologies Inc

Securing data across the enterprise while simplifying IT operations
sponsored by Thales
WHITE PAPER: The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.
Posted: 27 Mar 2020 | Published: 31 Aug 2019

Thales

Encrypt Everything
sponsored by Thales
WHITE PAPER: Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security.
Posted: 26 Mar 2020 | Published: 30 Nov 2019

Thales

Keeping Up with Data Security Compliance in the Age of Data Privacy Laws
sponsored by InteliSecure
WHITE PAPER: As more and more data privacy regulations come into play, organizations are constantly tasked with reviewing and revising their security plan to adhere to these laws. This white paper dives deeper into achieving data security in the era of GDPR, CCPA and other legislations. Read on to learn more.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

InteliSecure

Your Guide to Threat Intelligence, AI & Incident Response
sponsored by Dell SecureWorks
EGUIDE: Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Dell SecureWorks
1 - 25 of 223 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info