IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 769 Matches Previous Page  |  Next Page
Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores what credential stuffing is and how it works, helping you to understand the potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Akamai Cloud Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about Akamai's cloud-based approach to security that leverages 24/7 monitoring to collect and analyze terabytes of attack data, bot requests, and IP addresses to solidify your defenses. Plus, discover 7 keys to reducing your attack surface.
Posted: 12 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Mapping the Requirements of Next-Generation Sandboxing
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 7 key capabilities to look for in a next-gen sandboxing platform so that you can build a security architecture that's designed to detect and prevent threats before they can impact your network or your business as a whole.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

What SOC Managers Should Know about Security Orchestration and Threat Intelligence
sponsored by Siemplify
WHITE PAPER: Find out how security orchestration, automation, and response can empower security operations center teams to integrate data from disparate security systems for a more effective way to investigate and identify potential threats.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Siemplify

Selecting a Security Orchestration Vendor
sponsored by Siemplify
WHITE PAPER: This white paper gives an overview of security orchestration, automation, and response technologies, providing you with the tools you need to evaluate vendors. As you select your system, discover which 6 features to look for.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Siemplify

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Deconstructing a Modern Bank Heist: the [not] Carbanak Source Code Leak
sponsored by Illusive Networks
RESOURCE: In August 2018, part of the source code leaked for Buhtrap/Ratopak/Pegasus malware threats – creating a rare opportunity to see how these attacks work and are executed by bad actors. This resource analyzes the leaked source code and takes a look at how it sneaks through network defenses.
Posted: 12 Sep 2018 | Published: 03 Aug 2018

Illusive Networks

Solving the Financial Services Security Talent Shortage with Managed Detection
sponsored by Arctic Wolf
WEBCAST: This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

SOC-as-a-Service for Financial Institutions
sponsored by Arctic Wolf
WHITE PAPER: Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

No Business Is Too Small a Target for Hackers
sponsored by Arctic Wolf
WHITE PAPER: Find out how SMBs, despite the fact that they lack the resources and skilled experts that many of their larger contemporaries have, can step up their defense against hackers with measures like security operations center as a service (SOCaaS).
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Arctic Wolf

Cybersecurity Essentials Every Law Firm Needs
sponsored by Arctic Wolf
WHITE PAPER: Organizations like law firms possess vast quantities of highly sensitive information that puts them at the top of hackers' hit lists. Learn about 5 essential security capabilities for protecting company and client data that every firm must have.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

Forcepoint Cloud Access Security Broker (CASB) Assessment
sponsored by Forcepoint
RESEARCH CONTENT: This ESG report examines the Forcepoint Cloud Access Security Broker (CASB) to assess its ability to secure the use of any cloud apps across an organization's users and endpoints. Explore ESG's findings and discover how Forcepoint's CASB performs in terms of visibility, risk management, and protection.
Posted: 06 Sep 2018 | Published: 31 Mar 2018

Forcepoint

SOC-as-a-Service for Cloud Infrastructures and SaaS Applications
sponsored by Arctic Wolf
WHITE PAPER: Find out how to overcome some of the top security challenges facing hybrid cloud architectures – from data exfiltration to insider threats – with a security operations center as a service (SOCaaS).
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

How to Proactively Prevent Security Threats across Endpoints
sponsored by Cylance
RESEARCH CONTENT: This Forrester Total Economic Impact Report investigates the effect of Cylance on organizations' ability to protect their critical assets and endpoints.
Posted: 29 Aug 2018 | Published: 28 Feb 2018

Cylance

Combatting Botnet Traffic with Behavioral Analysis
sponsored by ThreatX
RESOURCE: Find out how to detect and block a number of different distributed attacks with a robust security approach that's designed to grant you visibility into malicious traffic.
Posted: 29 Aug 2018 | Published: 28 Jun 2018

ThreatX

Tightly Coupling Applications and Security for Infinite Scale
sponsored by ThreatX
RESOURCE: Find out how to modernize security so it can keep up with the demands of microservices and container-based app development.
Posted: 29 Aug 2018 | Published: 20 Aug 2018

ThreatX

Predictive Intelligence: Pre-Crime for IT
sponsored by Cisco Umbrella
EBOOK: Find out how to take a proactive stance against phishing and advanced malware attacks with a cloud-based security service that identifies and predicts attack infrastructure before bad actors can negatively impact your organization.
Posted: 29 Aug 2018 | Published: 31 Dec 2016

Cisco Umbrella

5 Categories of Questions for Evaluating AI-Driven Security Tools
sponsored by Cylance
WHITE PAPER: With countless numbers of security tools boasting "AI and machine learning capabilities," AI has become something of a buzzword in the security world. But sometimes, there's some truth to the hype. Get tips on how to effectively evaluate AI-based security tools by learning about 5 useful categories of questions to ask.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cylance

The Predictive Advantage against Malware: It's About Time
sponsored by Cylance
RESOURCE: Find out how preventative, proactive security platforms like CylancePROTECT can help combat against increasingly advanced malware threats – both known and unknown.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cylance

How ThreatConnect Leverages DNSDB to Track Down Grizzly Steppe
sponsored by Farsight Security
WHITE PAPER: Find out how ThreatConnect used a passive DNS database intelligence approach to extend Grizzly Steppe data from the Joint Analysis Report and discover new indicators that expose cyberespionage activity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Farsight Security

Australian Companies Leaving Themselves Exposed on Security and Compliance
sponsored by Mimecast
RESEARCH CONTENT: Uncover the shocking survey results from 193 Australian CIOs and IT Managers that reveal how far behind they are in preparing for regulations and training security staff.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Mimecast

Securing VPN with Multi-Factor Authentication
sponsored by Okta
WHITE PAPER: Learn about an adaptive multi-factor authentication platform that's designed to bring a new level of security to your VPN and the users in your network environment, no matter where they're connecting from.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Okta

Identity-Driven Security
sponsored by Okta
WHITE PAPER: Find out how to bolster your security posture by upping your defenses against threats – both internal and external – with identity-driven security that strives to improve identity and access management as well as authentication.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Okta
1 - 25 of 769 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement