IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1359 Matches Previous Page  |  Next Page
Leveraging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

The Impact of XDR in the Modern SOC
sponsored by Dell SecureWorks
ANALYST REPORT: Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
Posted: 23 Feb 2021 | Published: 30 Nov 2020

Dell SecureWorks

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk. Engage this webinar, the Global Resilience Federation Virtual Summit on Security & Third-Party Risk, to explore emerging cyber risk considerations.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We’ve Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

The Golden Tax Department and Emergence of GoldenSpy Malware
sponsored by Trustwave
ANALYST REPORT: To defend your organization against the GoldenSpy threat, download this Trustwave report. Inside, you’ll find details on the attack methodology, suspected entities behind the activity, and protective measures to mitigate risk of being impacted.
Posted: 23 Feb 2021 | Published: 31 Dec 2020

Trustwave

The Threat Hunt That Uncovered Novel Malware
sponsored by Trustwave
CASE STUDY: What do you do when a required software program comes inadvertently bundled with sophisticated malware? Read the full case study here for a breakdown of how one technology vendor identified and remediated the hidden threat with help from the Trustwave SpiderLabs team.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Trustwave

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Crisis Management: A Best Practice Approach in Healthcare
sponsored by Trustwave
CASE STUDY: Read this case study to learn how Trustwave’s custom tabletop drill exercise involving a fictional breach of a hospitals digital systems helped prepare them for the real thing.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Trustwave

Making it Safe for Federal Employees to Work Remotely
sponsored by Forcepoint
EBOOK: The Office of Management and Budget (OMB) released guidance recommending agencies implement ‘maximum’ telework flexibility where possible. While you may have some security in place to accommodate this sudden shift, it’s tough to be fully prepared. Study this e-book to learn tips for securing federal remote workers.
Posted: 22 Feb 2021 | Published: 14 May 2020

Forcepoint

Making it Safe for Federal Employees to Work Remotely
sponsored by Forcepoint
EBOOK: The Office of Management and Budget (OMB) released guidance recommending agencies implement ‘maximum’ telework flexibility where possible. While you may have some security in place to accommodate this sudden shift, it’s tough to be fully prepared. Study this e-book to learn tips for securing federal remote workers.
Posted: 22 Feb 2021 | Published: 14 May 2020

Forcepoint

7 Experts on Transforming Your Threat Detection & Response Strategy
sponsored by Trustwave
EBOOK: In this eBook, Trusthwave asked 7 security experts for advice on transforming a threat-detection and response strategy. Access it here to learn the practical strategies, recommendations, and advice they shared.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Trustwave

White Paper 360 Security For Office 365
sponsored by Trustwave
WHITE PAPER: Access this white paper to learn about 10 common email security risks and discover what you can do to protect your Office 365 investment from them.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Trustwave

Cloud Security: A Buyer's Guide
sponsored by Forcepoint
BROCHURE: The cloud security market boasts an overwhelming array of features, vendors and offerings. To help break up the noise, this Cloud Security: Buyer's Guide offers 15 points to keep top-of-mind while evaluating solutions and determining the best fit for your organization – read on to get started.
Posted: 22 Feb 2021 | Published: 06 Nov 2020

Forcepoint

Solution Brief: Malwarebytes Endpoint Detection and Response
sponsored by Malwarebytes
DATA SHEET: Endpoints have never been under greater threat: Attacks have doubled, false positives are skyrocketing and the complexity of EDR solutions is putting a strain on endpoint security. You can combat these issues with endpoint security that’s integrated, proactive and continuous. Check out this white paper to examine easy, effective, efficient EDR.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

Solution Brief: The Value of Multi-Vector Protection on the Endpoint
sponsored by Malwarebytes
WHITE PAPER: Today cybercriminals have moved to a multi-vector attack approach. It combines a mixture of social, malware, and hacking, which represent the triple threat in their multi-vector attack technique. And it's working. This means your endpoint security must protect from all 3. Read on to learn about a single solution for these multi-vector attacks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

SonicWall Secure SD-Branch
sponsored by SonicWall
DATA SHEET: Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

SonicWall

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Improve Threat Resolution Cycles by Leveraging DNS
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

Managing Cybersecurity Risk in the Supply Chain
sponsored by Clearswift
EGUIDE: Supply chains have become a prime target for cybercriminals – which is illustrated by the rise in third-party vulnerabilities and breaches across 2020. Read this e-guide to discover the emerging supply chain threats, their implications for each industry, and 5 ways organizations can better protect themselves.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Clearswift

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

Tips And Tricks On Safeguarding Your Data In The Cloud
sponsored by Atlassian
VIDEO: This webinar, Tips And Tricks On Safeguarding Your Data In The Cloud, highlights the top cyberthreats, compliance challenges, and industry best practices as they related to protecting your cloud-native data – watch now to get started.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021

Atlassian

How to address Phishing, Business Email Compromise, Account Takeovers & More
sponsored by Trustwave
RESEARCH CONTENT: The traditional notion of a perimeter is almost non-existent. Instead, today’s cybercriminals are targeting organizations where the people, and data, exist. Read this Osterman Research paper to discover today’s most demanding cyberthreats and the best practices required to defend against them.
Posted: 17 Feb 2021 | Published: 31 Aug 2019

Trustwave

Trend Micro Cloud One for Workload Security
sponsored by Trend Micro
DATA SHEET: Optimizing and securing workloads has become a more complex task as server workloads move towards cloud environments, virtual servers and even containers. Read this data sheet to see how Trend Micro’s Cloud One can help organizations meet these 4 key business imperatives and ensure security for physical, virtual, cloud and container workloads.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro

Trend Micro Cloud One: Application Security
sponsored by Trend Micro
DATA SHEET: As reliance on business applications grows, it becomes increasingly critical to ensure each app and API is adequately protected and accounted for. Read this data sheet to see how Trend Micro’s Cloud One offering thwarts today’s application-specific cyberthreats.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro
1 - 25 of 1359 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info