IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 550 Matches Previous Page  |  Next Page
High Alert: Tackling Cybersecurity Overload in 2019
sponsored by Symantec
EBOOK: Download this e-book for exclusive new research from Symantec that highlights the challenge that CISOs and security leaders face in trying to find, attract and retain cybersecurity professionals.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

ComputerWeekly.com

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Transparent Data Movement Solution Overview
sponsored by RackTop Systems
DATA SHEET: Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

CyberConverged Data Storage
sponsored by RackTop Systems
DATA SHEET: Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage Designed for the Creative Process
sponsored by RackTop Systems
DATA SHEET: Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage: An Overview
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Getting a Handle on Data Exposure
sponsored by RackTop Systems
DATA SHEET: The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Barracuda

Our Own Worst Enemy: Tackling the Social Engineering Problem
sponsored by RSA Conference
RESOURCE: As it turns out, the weakest link in any cybersecurity solution is...us. With hackers using social engineering scams to fool people into giving up personal information, what's the best way to address this growing issue? Download this podcast transcript for an expert discussion on how to positively impact employee behavior.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

RSA Conference

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs
sponsored by SkOUT
CASE STUDY: To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

SkOUT

How to Prevent Data Breaches
sponsored by SkOUT
WHITE PAPER: How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

SkOUT

What is Phishing?
sponsored by SkOUT
WHITE PAPER: Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

Anybody Home? Vulnerability Scans vs. Penetration Tests
sponsored by SkOUT
WHITE PAPER: This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

The Impact of Cyber-Based Financial Fraud
sponsored by SkOUT
WHITE PAPER: Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

Proofpoint Security and Compliance for Microsoft Office 365
sponsored by Proofpoint
DATA SHEET: Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

Cutting Bait: How to Identify, Avoid, and Protect Against Phishing
sponsored by SkOUT
WHITE PAPER: How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

SkOUT

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

Gigamon

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Barracuda Lightboard: Total Email Protection
sponsored by Barracuda
VIDEO: This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.
Posted: 28 May 2019 | Premiered: 31 Jan 2019

Barracuda

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 28 May 2019 | Published: 31 Mar 2019

Barracuda

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda
1 - 25 of 550 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement