Security Management Reports

Five Ways to Secure Mobile Data with EMM
sponsored by Appthority
EGUIDE: This expert e-guide details 5 ways to secure mobile data using enterprise mobility management (EMM) to keep your organization on the cutting edge.
Posted: 14 Feb 2017 | Published: 10 Feb 2017

Appthority

Preventing Ransomware: Healthcare CIO Discusses Top Technologies
sponsored by Cisco Umbrella
EGUIDE: In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.
Posted: 07 Feb 2017 | Published: 02 Feb 2017

Cisco Umbrella

Use a web app firewall to halt app attacks
sponsored by TechTarget Security
EBOOK: Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017

TechTarget Security

Methods for Preventing Hospital Ransomware Infections and Cyberattacks
sponsored by Cisco Umbrella
EGUIDE: The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.
Posted: 06 Feb 2017 | Published: 02 Feb 2017

Cisco Umbrella

Crafting an Insider Threat Program: Why and How
sponsored by TechTarget Security
EBOOK: Tackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats.
Posted: 23 Jan 2017 | Published: 20 Jan 2017

TechTarget Security

APT-Style Attacks: How Cybercriminals are Using Them
sponsored by WatchGuard Technologies, Inc.
EGUIDE: New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
Posted: 17 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Unified Insights on One Unified Threat Management Market Product
sponsored by WatchGuard Technologies, Inc.
EGUIDE: This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.
Posted: 16 Jan 2017 | Published: 13 Jan 2017

WatchGuard Technologies, Inc.

The Digital Certificate: How It Works, Which to Buy
sponsored by TechTarget Security
EBOOK: If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017

TechTarget Security

Securing IoT in 3 steps
sponsored by TechTarget Security
EZINE: A lack of proper security testing for IoT devices could create security risks in your organization. This resource provides IT security pros with a deeper understanding into how they can improve IoT security within their companies.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

TechTarget Security

Unleash Your Security Data's Full Potential
sponsored by TechTarget Security
EBOOK: Battling today's top cybersecurity threats requires the best in threat intelligence and security tools; learn what your enterprise defense posture needs now.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

TechTarget Security

Container Security: How to Secure Enterprise Container Stacks
sponsored by NeuVector
EGUIDE: Learn the basics of container security and how to best secure your container stacks. Discover tools available to plug potential security holes and strategies to keep your organization secure.
Posted: 05 Dec 2016 | Published: 02 Dec 2016

NeuVector

What to Look for in Incident Response Management Tools
sponsored by TechTarget Security
EBOOK: Breaches are inevitable, so an effective incident response toolkit is essential. In this buyer's guide, learn the current and upcoming requirements for IR tools and what features are most vital.
Posted: 29 Nov 2016 | Published: 29 Nov 2016

TechTarget Security

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

Security Analytics: Searching for Meaning
sponsored by TechTarget Security
EBOOK: This expert e-guide helps clarify how advanced security analysis differs from the threat assessments of the past. Access now for a deeper understanding of how advanced security analytics works and how it can best be used in your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

TechTarget Security

Optimize Your SIEM Operations
sponsored by McAfee, Inc.
RESOURCE CENTER: Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

McAfee, Inc.

Adjusting a Continuous Monitoring Strategy to a Hybrid Era
sponsored by LogRhythm, Inc.
EGUIDE: Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

SIEM Analysis Interfaces for Security Professionals
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by McAfee, Inc.
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

McAfee, Inc.

Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by TechTarget Security
EZINE: Today's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
Posted: 16 Nov 2016 | Published: 11 Nov 2016

TechTarget Security

Discover SIEM Capabilities For Real-Time Analysis
sponsored by LogRhythm, Inc.
EGUIDE: In this expert e-guide, learn what 3 SIEM capabilities aid the real-time analysis of collected information and security alarms, allowing for prompt detection of actual or potential attacks.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts
sponsored by HP Inc
EGUIDE: In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
Posted: 14 Nov 2016 | Published: 02 Nov 2016

HP Inc

The SDN Charge and the New Role in Mobile Security
sponsored by Juniper Networks, Inc.
EGUIDE: Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
Posted: 14 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

Top Benefits of Integrated Endpoint Protection
sponsored by Trend Micro, Inc.
EGUIDE: When implementing endpoint security, is it better to buy standalone products or an endpoint security suite? Access this e-guide to learn the benefits of integrated endpoint protection software and find out for yourself.
Posted: 11 Nov 2016 | Published: 10 Nov 2016

Trend Micro, Inc.

Enhance Your Endpoint Security Protection
sponsored by Trend Micro, Inc.
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

Trend Micro, Inc.

New Data Classifications Vital to Information Governance and Security
sponsored by STEALTHbits
EGUIDE: In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

STEALTHbits