IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
51 - 75 of 976 Matches Previous Page  |  Next Page
Market Guide For Managed Detection And Response Services
sponsored by eSentire
ANALYST REPORT: Organizations are turning to managed detection and response (MDR) services for turnkey threat detection and response via modern, remotely delivered 24/7 security operations center capabilities and technology. Use this Gartner research report to determine whether MDR is a good fit with your operational security requirements.
Posted: 16 Feb 2021 | Published: 26 Aug 2020

eSentire

The 2021 State Of Open Source Vulnerabilities
sponsored by Fossa
RESEARCH CONTENT: Open source has become increasingly popular – but as its usage grows, so too do its vulnerabilities. This research report provides a comprehensive look into today’s open source vulnerability landscape, highlighting current trends, long-term developments and best practices – read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Fossa

The Total Economic Impact™ Of ServiceNow Security Operations
sponsored by ServiceNow
ANALYST REPORT: With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.
Posted: 12 Feb 2021 | Published: 30 Oct 2020

ServiceNow

Enable & Secure Your Remote Workforce
sponsored by BeyondTrust Corporation
EGUIDE: IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

BeyondTrust Corporation

Automated Pen Testing Vs Breach & Attack Simulation
sponsored by Cymulate
EGUIDE: Attack simulation and penetration testing are popular methods for organizations to find and address potential weaknesses in their security programs – but deciding between pen testing and attack simulation can be tricky. Read this e-guide for helpful tips.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Secure by Design Cloud Business Communications Apps & Infrastructure from NWN
sponsored by NWN Corporation
DATA SHEET: Integrated security is helping companies mitigate larger attack surfaces created by remote and hybrid work teams. Security postures are shifting from reactive to proactive, and one-size-fits-all approaches are falling by the wayside. View this solution brief to explore how to get a unified view of your entire cloud communications infrastructure.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

NWN Corporation

How Cyberattack Simulations Differ From Penetration & Vulnerability Tests
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Simulating The Latest Threats and Techniques with The MITRE ATT&CK Matrix
sponsored by Cymulate
EBOOK: Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Aflac Enhances Cyber Threat Intelligence and Integrates Security Ecosystem with Infoblox
sponsored by Infoblox
CASE STUDY: In this case study, discover how Aflac, a major insurance provider in the US, was able to tackle a massive transformation across 3 fronts: cloud, threat intelligence, and cybersecurity. Read on to see why they chose Infoblox as their trusted strategic partner and discover the results of Aflac’s 3 major projects.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Infoblox

High-Velocity Cloud Security At Scale
sponsored by BreakFree Solutions
WHITE PAPER: The key to realizing the full benefits of a cloud migration lies in striking a balance between transformative cloud capabilities and effective cloud security. Read this insight report to learn about BreakFree’s cloud security framework and discover how to implement it with JupiterOne.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BreakFree Solutions

The Guide To Just-In-Time Privileged Access Management
sponsored by BeyondTrust Corporation
EGUIDE: Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BeyondTrust Corporation

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
PRESENTATION: Today’s cyberthreats are becoming increasingly troublesome, and traditional security efforts often lack the unified vision and visibility required to tackle these challenges. Read this presentation for a closer look at today’s advanced threats and discover how Endpoint detection and response (EDR) tools are uniquely positioned to address them.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Bitdefender

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

Market Guide for Insider Risk Management Solutions
sponsored by Proofpoint
RESEARCH CONTENT: Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Use this Gartner Market Guide to understand and implement insider risk mitigation.
Posted: 11 Feb 2021 | Published: 29 Dec 2020

Proofpoint

Advanced Threat Detection, Focused Investigation And Effective Response
sponsored by Bitdefender
DATA SHEET: Traditional endpoint security efforts are growing less and less capable of preventing today’s sophisticated cyberthreats – increasing the need for advanced threat detection, investigated and response capabilities, typically in the form of Endpoint Detection and Response (EDR). Read this datasheet to see what Bitdefender offers in terms of EDR.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

Bitdefender

The Total Economic Impact™ Of ServiceNow Risk And Compliance
sponsored by ServiceNow
RESEARCH CONTENT: Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.
Posted: 10 Feb 2021 | Published: 31 Jan 2021

ServiceNow

Case Study: Archdiocese
sponsored by Bitdefender
CASE STUDY: The Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Bitdefender

Bitdefender Managed Detection & Response Service
sponsored by Bitdefender
DATA SHEET: Today’s cyberthreats are growing in their volume and sophistication, and security teams are facing increased pressure to address these threats while their resources to do so diminish – so what can be done to remedy this? Read this datasheet to learn more about the benefits of MDR and discover the key features of Bitdefender’s MDR offering.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Bitdefender

Preventing unwanted sensitive data acquisition on the corporate network
sponsored by HelpSystems
EGUIDE: Insider threats are quickly becoming one of the most prominent risk areas for an organization. In fact, the average cost of an insider threat for organizations in 2020 was estimated at $2.79 million. But where are these insider threats coming from and how can an organization be equipped to handle them? Read this e-guide to find out.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

HelpSystems

Are You Ready For Managed Detection and Response?
sponsored by Bitdefender
PRODUCT OVERVIEW: Managed Detection and Response (MDR) tools have emerged to ease the burden of high volumes of cyberthreats on security teams. But what exactly is MDR, what key gaps does it address, and how does it improve security? Read on to find out
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Bitdefender

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

Hacker's Path To The Crown Jewels
sponsored by Cymulate
EBOOK: Hacking campaigns typically follow a predictable pattern involving 4 main activities: Recon, initial foothold, lateral movement, and data exfiltration. Download this e-book to learn more about this 4-step hacking pattern and discover how organizations can better detect the early warning signs of an impending hack.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Cymulate

The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020

Bitdefender

Four Cybersecurity Essentials That Your Board Of Directors Wants To Know
sponsored by Cymulate
EGUIDE: For security leaders, one of the most daunting tasks is explaining your organization’s cybersecurity strategy and needs to a nontechnical audience – especially when that audiences consists of executives and the board of directors. Read this e-guide to learn about which key metrics to highlight and how to make your case to a room of execs.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Cymulate

MicroScope – February 2021: The forecast on channel security
sponsored by MicroScope
EZINE: MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
Posted: 04 Feb 2021 | Published: 05 Feb 2021

MicroScope
51 - 75 of 976 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences