IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 566 Matches Previous Page  |  Next Page
6 Practical Approaches to Bridge the Cybersecurity Talent Shortage
sponsored by Alert Logic
WHITE PAPER: Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Alert Logic

New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

Magic Quadrant for Managed Security Services, Worldwide
sponsored by Alert Logic
RESOURCE: Managed security services (MSSs) enable organizations to outsource certain tasks to ensure security events are being monitored 24/7. In this Gartner Magic Quadrant report, go in-depth into the key MSS providers to identify those best aligned to the needs of your organization.
Posted: 15 Jan 2020 | Published: 02 May 2019

Alert Logic

Multi-pronged approach to cyber security professional development
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

Flexible Cybersecurity Awareness Training for a Diverse Workforce
sponsored by Mimecast
CASE STUDY: In this case study, follow Mater’s journey towards developing a flexible cybersecurity awareness training for their diverse workforce, and discover how including comedy – instead of horror stories – is more engaging and effective.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Mimecast

The Importance of Cybersecurity for Executives
sponsored by A-Lign
WHITE PAPER: As security threats become increasingly frequent, complex and disruptive, it’s critical for all leaders – not just the CIO, CTI and CISO – of an organization to play a role in ensuring security. In this white paper, explore the importance of cybersecurity for executives by looking at the common types of attacks and how to prevent them.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

A-Lign

The ROI of Security Awareness Training
sponsored by Mimecast
WHITE PAPER: When it comes to developing a security strategy to protect your organization’s sensitive data, it’s critical to consider both the people within your environment as well as the technology. In this white paper, review the results of in-depth research recently conducted by Osterman Research and discover the need for security awareness programs.
Posted: 11 Dec 2019 | Published: 31 Aug 2019

Mimecast

Decluttering Your Security Environment
sponsored by Mimecast
WHITE PAPER: While it’s natural to think that the solution to increased security risk is incorporating more technology, overcomplicating your environment with tools – and not the right personnel – can lead to increased risk. In this white paper, leverage expertise from a recent think tank for advice on how to address cybersecurity complexity.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

Mimecast

5G, AI, Deepfakes and Beyond: The Future of IT and Security
sponsored by Splunk
WHITE PAPER: The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Splunk

Splunk IT Security Predictions 2020
sponsored by Splunk
WHITE PAPER: Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Splunk

Getting Started with Zero Trust: Never Trust, Always Verify
sponsored by Okta
WHITE PAPER: As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

Your Cybersecurity Tech Stack Creating More Gaps
sponsored by Optiv
RESOURCE: It’s a common misconception that more tech services mean more security, but the reality is quite the opposite. In fact, a Cisco cybersecurity report reveals a correlation between the number of security vendors and the number of breaches. In this infographic, dive deeper into this issue and explore ways to close the gap.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Optiv

Evolve your Security Operations Center
sponsored by Optiv
WEBCAST: Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.
Posted: 04 Dec 2019 | Premiered: Sep 23, 2019

Optiv

Easy Ways to Dominate the Securities-as-a-Service Game
sponsored by RapidFire
WHITE PAPER: Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

Rethinking Enterprise Data Defense
sponsored by FireMon
EBOOK: Despite heavy investment of time and resources, the number of cybersecurity breaches and incidents continues to increase each year. In this e-book discover how to rethink your enterprise security strategy and explore proactive defense tactics.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

FireMon

Whirlpool Corporation Takes Tanium Out for a Spin
sponsored by Tanium
CASE STUDY: In this case study, discover how Whirlpool leveraged the Tanium platform to discover and act on IT challenges in order to improve their ‘security hygiene’ within their complex environment. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium

Application security: best practices and risks
sponsored by ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

ComputerWeekly.com

How Machine Learning Can Help You Keep up with Current Threats
sponsored by Appian
WHITE PAPER: Can AI and machine learning (ML) systems actually help solve IT security problems and protect against threats moving forward? Download this e-guide for more expert insights into the potential AI and ML can bring to your organization’s proactive security measures.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Appian

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Barracuda

Cloud Security Guardian Integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.
Posted: 08 Oct 2019 | Premiered: 31 Jul 2019

Barracuda
1 - 25 of 566 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info