IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1415 Matches Previous Page  |  Next Page
Cybersecurity: The Human Challenge
sponsored by Sophos
ANALYST REPORT: If your organization is looking for a direction to turn in regarding cybersecurity, then it may help to see what others have been prioritizing. View this Sophos report to learn perspectives from 5,000 IT managers across 26 countries. It will provide brand new insights into the state of cybersecurity skills and resources across the globe.
Posted: 23 Nov 2020 | Published: 30 Oct 2020

Sophos

Upgrade the Hunt with Splunk and DomainTools
sponsored by DomainTools
WEBCAST: Splunk has just released an update for its prominent app DomainTools that offers enhanced detection, monitoring and diagnostic capabilities as well as more customization, self-service capabilities and deeper contexts within enterprise security. Watch this webcast to learn how you may be able to take your threat hunt to the next level.
Posted: 23 Nov 2020 | Premiered: Nov 23, 2020

DomainTools

How Financial Services Can Achieve and Manage Continuous Security and Compliance in a Public Cloud
sponsored by IBM
WHITE PAPER: The financial services industry is perhaps the most highly regulated in the world. In the U.S., banks must comply with at least 10 major regulations at the federal level alone. So how, then, are financial services firms to migrate to the cloud in a secure and compliant manner? Read this IBM white paper to see some suggestions.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

IBM

Managed Detection and Response (MDR) Services Buyers Guide
sponsored by Sophos
EGUIDE: Managed detection and response (MDR) tools are growing in popularity among security leaders as workloads grow in volume. The following buyers guide highlights the potential benefits and required capabilities of an ideal MDR tool and evaluates current offerings against these features – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Sophos

Case Study: Protecting Trusted Insiders
sponsored by Dtex
CASE STUDY: Recently, a slew of invoice-themed malicious phishing emails was found to have penetrated a customer network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to learn to identify, understand and mitigate a targeted phishing attack.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

IT Risk Management: Comparing Top Vendors & Offerings
sponsored by ServiceNow
RESEARCH CONTENT: Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.
Posted: 23 Nov 2020 | Published: 11 Aug 2020

ServiceNow

To Pay Or Not To Pay: It’s About The Provider
sponsored by Radware
RESOURCE: Should a ransomware attack strike, would your organization pay the ransom fee or not? How do you calculate if it’s worth it to pay the fee or not? This Radware article breaks down the most critical factors that go into answering these questions – read on to see if you should pay.
Posted: 23 Nov 2020 | Published: 29 Oct 2020

Radware

Remote Working Is New To A Lot Of Organizations, But Not To Williams Racing
sponsored by Dtex
CASE STUDY: It’s no secret that to be successful in Formula 1, racing teams need to have a cohesive, synchronized strategy on race day – but what about the team members that aren’t at the track on race day? Read this case study to see how Williams Racing protects their remote workers and the role cybersecurity plays in their success.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Next Generation Endpoint Protection
sponsored by Claranet
WHITE PAPER: Traditional cybersecurity is no match for today’s endpoint security threats – so does that mean antivirus (AV) is dead? This buyer’s guide provides an overview of why traditional tactics – like AV – aren’t working, a new approach to endpoint security, and an evaluation of next-generation endpoint protection vendors – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Claranet

Improve Data Security in the Modern Enterprise
sponsored by Fasoo
EGUIDE: If your organization has begun an initiative around improving data security, it’s important to monitor the amount of data you’re collecting in order not to create too much risk. Learn more tips like these in our expert guide, Improve Data Security in the Modern Enterprise.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Fasoo

Securing Azure Environments: Insights from PetSmart, Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Microsoft Azure plays an important role in many organizations’ digital transformation initiatives. As such, it becomes critical to understand the capabilities, limitations and potential benefits of Azure. Watch this webinar to gain insights into Azure from experts at PetSmart, Microsoft and Barracuda.
Posted: 23 Nov 2020 | Premiered: 23 Nov 2020

Barracuda

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

Discover How to Remove Security Barriers and Experience the Benefits of Azure
sponsored by Barracuda
WEBCAST: Digital transformation is well underway, requiring profound changes—and bringing a host of new benefits. As you prepare your organization to begin or advance its migration to Azure, you want up-to-date, actionable info about best practices in the cloud—including security. Watch this webcast to become more informed on these practices.
Posted: 20 Nov 2020 | Premiered: Apr 2, 2020

Barracuda

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are becoming increasingly costly – in fact, the average global cost to remediate an attack is over $700,000. One of the best ways to protect against ransomware attacks is with properly configured endpoint protection. Read on to discover best practices for configuring your endpoint protection against ransomware.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Sophos

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Modern firewalls are highly effective at defending against ransomware attacks, but they need to be given the chance to do their job. In this whitepaper, discover how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.
Posted: 20 Nov 2020 | Published: 31 Aug 2020

Sophos

EUC Security for Work-from-Home
sponsored by TierPoint
WHITE PAPER: End user computing (EUC) allows users to access data from a centralized, enterprise-class datacenter where it is professionally managed, monitored and backed up. But centralizing data alone won’t protect your organization from a growing plethora of cyber threats. So, how can you better protect your end users? Read this white paper to find out.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

TierPoint

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent past. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

Foundstone Targeted Malware Threat Assessment 360
sponsored by McAfee
DATA SHEET: Reactionary approaches to cybersecurity are no longer viable, security teams need to actively hunt out threats and stop them before they strike. The following data sheet provides an overview of the Foundstone Targeted Malware Threat Assessment 360, designed to equip security pros with threat hunting capabilities – read on to learn more.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

McAfee

Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK: Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Proofpoint

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

The Online Retailer’s Guide to Higher Profitability
sponsored by Cloudflare and Queue IT
EBOOK: Retailers are preparing for the upcoming holidays, the most lucrative time of the year for online shopping. If you haven’t already begun capacity planning or upgrades to your online store infrastructure, there’s still time to get ready. View this guide to see a checklist to make sure your online store is ready for the holidays.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cloudflare and Queue IT

10 Tips to Strengthen your Insider Threat Program
sponsored by Dtex
EBOOK: With the commonality of remote work creating more vulnerability than ever, strengthening threat detection has become paramount. But how do you go about putting your eggs in the right security baskets? Read this explosive e-book for 10 tips for strengthening your insider threat program.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Dtex

How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation
sponsored by WhiteHat Security
CASE STUDY: A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

WhiteHat Security

ExtremeCloud™ IQ: Cloud Security and Architecture Overview
sponsored by Extreme Networks
WHITE PAPER: If you’re searching for a cloud-based network management and security solution that strives to provide centralized configuration, orchestration and network monitoring, reporting, alarms and statistics for all cloud-enabled devices, read this comprehensive white paper.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Extreme Networks

Leveraging the Cloud to Reinforce 7 Critical Layers of Security
sponsored by Hyland
EBOOK: If your data and your customers’ data is vulnerable to incursions or catastrophic events, the future of your business isn’t safe. Without proper defensive measures, your data is unprotected and your ability to service customers can be impacted. View this e-book to learn how to leverage the cloud to maximize 7 critical layers of security.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Hyland
1 - 25 of 1415 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info