IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed   
Security Information and Event Management Reports
 
What Is Intrinsic Security?
sponsored by VMware International Unlimited Company
VIDEO: In this video, join Tom Corn, Senior Vice President of security products at VMware as he defines the concept of intrinsic security and outlines the value it can bring to your security efforts as well as business operations as a whole.
Posted: 05 May 2020 | Premiered: 05 May 2020

VMware International Unlimited Company

State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER: For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

The Ultimate Guide to: AWS, Azure, and GCP Cloud Asset Visibility
sponsored by Orca Security
WHITE PAPER: As organizations continue to embrace cloud migration, IT and security teams should reevaluate their current ability to view and analyze their cloud assets. The following guide explores current tactics and unveils a next-generation visibility and security tool designed to enable agentless visibility into AWS, Azure and GCP. Read on to learn more.
Posted: 11 May 2020 | Published: 11 May 2020

Orca Security

Beginners Guide – Securing Legacy Devices
sponsored by NetLib Security
RESOURCE: Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.
Posted: 14 May 2020 | Published: 14 May 2020

NetLib Security

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

E-commerce has been revolutionized in the last decade
sponsored by The Media Trust
WEBCAST: Most brands don’t control or manage 65-95% of the code that defines the digital shopping experience. While this code enables critical features, it exposes organizations to potential security risks. In this webinar, take a closer look at third-party risk areas and discover how to address these challenges.
Posted: 05 May 2020 | Premiered: May 5, 2020

The Media Trust

Cloud Native Security
sponsored by Rackspace
WEBCAST: The global shift towards cloud tools and capabilities has completely changed the cybersecurity landscape. Now more than ever, organizations need to re-evaluate their cloud security strategy to reflect today’s challenges. In this webcast, join security experts at Rackspace and AWS as they discuss these challenges and explore how to address them.
Posted: 19 May 2020 | Premiered: May 19, 2020

Rackspace

Okta ASA Netskope Private Access demo
sponsored by Okta + Netspoke
VIDEO: In this video demo, join a Solutions Architect at Okta as they provide a quick walkthrough of how Okta Advanced Server Access & Netskope Private Access can work together to enhance user experience.
Posted: 18 May 2020 | Premiered: 12 Mar 2020

Okta + Netspoke

How Do You Know If You Are Making the Right MSSP Choice?
sponsored by BlueVoyant
RESOURCE: MSSPs make valuable partners when it comes to ensuring the protection of your network and data. However, the unique nature of cybersecurity requires a thoughtful MSSPs selection process. The following evaluation guide is designed to equip you with key considerations for assessing your current environment, as well as vetting future MSSPs.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Don’t Give Away Keys to Your Kingdom with ADFS
sponsored by PortSys
RESOURCE: For years, organizations have been using Active Directory Federated Services (ADFS) to manage access to cloud applications. However, sole reliance on ADFS for managing these accounts can introduce risks. In this article, discover how Total Access Control (TAC), Portsys’ zero-trust offering, can help protect ADFS accounts from cyberattacks.
Posted: 06 May 2020 | Published: 28 Apr 2020

PortSys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info