Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Security Infrastructure Spending

RSS Feed   
Security Infrastructure Spending Reports
 
API Security Checklist
sponsored by Curity AB
EGUIDE: As APIs grow in usage, they become a more valuable target for cybercriminals. This API Security Checklist was written to help guide you on your journey towards protecting web APIs by offering insight into emerging threats, best practices and expert insights – read on to unlock the full guide.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Curity AB

2021 Sans Cyber Threat Intelligence (Cti) Survey
sponsored by Infoblox
RESEARCH CONTENT: Each year, the SANS institute releases a comprehensive report highlight expert insight into all things cyber threat intelligence (CTI). This year’s SANS CTI Survey report explores how the pandemic impacted CTI programs and practices throughout the year. Unlock the full report and discover all of SANS’ findings from last year.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Infoblox

The Third Question: What CISOs aren’t asking - and what’s at stake.
sponsored by Absolute Software Corporation
WHITE PAPER: The role CISO is the world’s most stressful balancing act between ensuring operational efficiency and protection against sinister cyberthreats. In this white paper, 4 of the world’s top cybersecurity innovators weigh in on the critical questions CISOs need to be – but often aren’t – asking themselves.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Absolute Software Corporation

Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT: Threat hunting is becoming the gold standard for addressing today’s increasingly disruptive cyberthreats – in fact, 93% of organizations agree that threat hunting should be a top security priority. Read this 2020 Threat Hunting Report for more insights and best practices as they related to the current state of threat hunting.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

DomainTools

Improve Security And Compliance
sponsored by Red Hat and Intel
EBOOK: Speed and response time are essential in reducing the impact of data breaches – in fact, containing a breach within 200 days or less reduced the overall cost of a breach by more than 50% in 2020. Read this e-book to learn more about how to improve security, reduce risk and ensure compliance.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Red Hat and Intel

Opinion Matters: UK Public Sector attitudes on communication security after the onset of COVID-19
sponsored by Zivver
RESEARCH CONTENT: The following report highlights the results from recent study into communication security trends and concerns across the UK public sector. Read through these in-depth results to see how your organization’s communication security concerns compare.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Zivver

Market Guide For Security Orchestration, Automation And Response Solutions
sponsored by Palo Alto Networks
RESEARCH CONTENT: SOAR is gaining traction as a way to improve security operations. Security and risk management leaders should evaluate how these tools can support and optimize their broader security operations capabilities. Read this Gartner Marketing Guide to learn more about sifting through the noise and choosing the best-fit SOAR tool for your needs.
Posted: 31 Dec 2020 | Published: 21 Sep 2020

Palo Alto Networks

Expand your Endpoint Security without expending resources
sponsored by Kaspersky
DATA SHEET: Now that the security perimeter is disappearing, integration can become a part of security stacks everywhere. Automation is already playing its part, and with the explosion of remote work at hand, a focus on endpoint detection and response (EDR) is necessary. View this data sheet to explore Kaspersky’s multi-layer security approach.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET: As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

WinMagic

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences