IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
26 - 50 of 1153 Matches Previous Page  |  Next Page
The Impact of XDR in the Modern SOC
sponsored by Dell SecureWorks
ANALYST REPORT: Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
Posted: 23 Feb 2021 | Published: 30 Nov 2020

Dell SecureWorks

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

The State of Enterprise Unified Communications & Contact Center Security
sponsored by Oracle
ANALYST REPORT: Real-time communications cyber risks are on the rise. 25% of companies say the threats hitting their communications infrastructure create more than 20 incidents per year. Not only do enterprises need stronger security, users want a better experience as well. Access this Dark Reading research report to learn more about the state of UC security.
Posted: 22 Feb 2021 | Published: 31 Jul 2020

Oracle

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Solution Brief: Malwarebytes Endpoint Detection and Response
sponsored by Malwarebytes
DATA SHEET: Endpoints have never been under greater threat: Attacks have doubled, false positives are skyrocketing and the complexity of EDR solutions is putting a strain on endpoint security. You can combat these issues with endpoint security that’s integrated, proactive and continuous. Check out this white paper to examine easy, effective, efficient EDR.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

Solution Brief: The Value of Multi-Vector Protection on the Endpoint
sponsored by Malwarebytes
WHITE PAPER: Today cybercriminals have moved to a multi-vector attack approach. It combines a mixture of social, malware, and hacking, which represent the triple threat in their multi-vector attack technique. And it's working. This means your endpoint security must protect from all 3. Read on to learn about a single solution for these multi-vector attacks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

SonicWall Secure SD-Branch
sponsored by SonicWall
DATA SHEET: Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

SonicWall

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Improve Threat Resolution Cycles by Leveraging DNS
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

Managing Cybersecurity Risk in the Supply Chain
sponsored by Clearswift
EGUIDE: Supply chains have become a prime target for cybercriminals – which is illustrated by the rise in third-party vulnerabilities and breaches across 2020. Read this e-guide to discover the emerging supply chain threats, their implications for each industry, and 5 ways organizations can better protect themselves.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Clearswift

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

The Evolution of Security Operations and the Contemporary State of Play
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, over half of all global businesses with 2,500+ employees already have a security operations center (SOC) in place, and 72% of those have built these capabilities within the last five years. Examine the full IDC report to follow this trend and to see some of the challenges that come with building a modern SOC.
Posted: 17 Feb 2021 | Published: 31 Aug 2020

Kaspersky

Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
Posted: 17 Feb 2021 | Published: 31 Jul 2020

Kaspersky

Security White Paper Data Security Is Serious Business.
sponsored by Alchemer
WHITE PAPER: The digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alchemer

Expand your Endpoint Security without Expending Resources
sponsored by Kaspersky
DATA SHEET: Now that the security perimeter is disappearing, integration can become a part of security stacks everywhere. Automation is already playing its part, and with the explosion of remote work at hand, a focus on endpoint detection and response (EDR) is necessary. View this data sheet to explore Kaspersky’s multi-layer security approach.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

Cybersecurity is Improving, But is it Enough?
sponsored by eSentire
WHITE PAPER: Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.
Posted: 17 Feb 2021 | Published: 31 Oct 2019

eSentire

Integrated Cybersecurity Model for Your Work-From-Anywhere Environment
sponsored by NWN Corporation
WHITE PAPER: Cybercrime was lucrative across 2020 – the pandemic exposed several security gaps that hackers were eager to exploit. This white paper highlights how the Integrated Cybersecurity Model can help protect remote workforces from today’s evolving cyberthreats – read on to learn more.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

NWN Corporation

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

2020 Enterprise Cloud Incident Response Survey
sponsored by Infoblox
RESEARCH CONTENT: In this year’s SANS Enterprise Cloud Incident Response (IR) Survey, discover the key challenges that today’s IT and security leaders are facing as it relates to addressing cloud-related threats – which range from external risks like data theft to internal dangers like staffing shortages. Download the report now to get started.
Posted: 16 Feb 2021 | Published: 30 Sep 2020

Infoblox

Eighth Annual Fraud Report
sponsored by IDology
RESEARCH CONTENT: Like changes in the market, cyberthreats evolve and change each year – especially with threats like fraud. This research report from IDology highlights how fraud evolved in 2020 and provides key insight into how events like COVID impacted fraud. Read on to unlock the full report.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

IDology

Randori Recon How To Prioritize Like An Attacker
sponsored by Randori
EBOOK: With the rise of cloud computing, containerization, and serverless computing, maintaining a perfect inventory of your external assets and ensuring they are patched has become an overwhelming challenge. Read this e-book to discover Randori’s best practices for analyzing your attack surface in the most effective way.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori

The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori
26 - 50 of 1153 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info