IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 740 Matches Previous Page  |  Next Page
Detect Threats before they Seriously Damage your Business
sponsored by BCM One - Verizon
RESEARCH CONTENT: Find out how managed security services can help bolster your security posture by analyzing data from your security devices and flagging the threats that pose the greatest risk to your organization so that you can resolve them before they have a negative impact.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

BCM One - Verizon

Simplify Compliance for FFIEC-NCUA with a Security Operations Center
sponsored by Arctic Wolf
WHITE PAPER: Find out how financial organizations can simplify FFIEC/NCUA compliance by leveraging a security operations center as a service (SOCaaS).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Arctic Wolf

Help for CISOs Overwhelmed by Cybersecurity Threats
sponsored by MASERGY
WHITE PAPER: Find out how to build your security strategy on a foundation of executive and senior IT-level collaboration, supported by managed detection and response services.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

MASERGY

Fighting Account Takeover (ATO) Fraud Attacks
sponsored by Riskified
WHITE PAPER: In this guide, get a rundown of account takeover (ATO) attacks – from how fraudsters get the credentials they need to access accounts to their modus operandi once they're in and what you can do after detecting the threat.
Posted: 03 Aug 2018 | Published: 30 Apr 2018

Riskified

Data protection: A business imperative
sponsored by IBM
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

Microsegmentation Builds Security Into Your Data Center's DNA
sponsored by VMware
WHITE PAPER: This white paper explores how to add a second layer of defense behind perimeter firewalls with microsegmentation. Learn how organizations like those in the education sector can take a new approach to data center security that's designed to halt the spread of malware.
Posted: 30 Jul 2018 | Published: 31 May 2016

VMware

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

2018 Cloud Security Report
sponsored by Ixia - Keysight
RESEARCH CONTENT: This research report explores how the security ecosystem is evolving in 2018 to tackle the challenges of an expanding attack surface. Get insights on all things cloud security – from the changing motivations and behaviors of threat actors to changes in the privacy landscape – and explore the report's 5 key findings.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

Resilient Security Architectures: The Paradigm Shift is Here
sponsored by Ixia - Keysight
WHITE PAPER: In the current business climate, it's not a question of if your network will be attacked, but when it will be attacked and how. Learn about a new paradigm shift that's emerging in response to this pressure called security resilience.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

Deploy Silent Security to Protect Identities and Future-Proof your IAM
sponsored by IBM
WHITE PAPER: Find out how you can deploy silent, nonintrusive identity and access management (IAM) that can weed out the bad actors without hindering employee productivity.
Posted: 25 Jul 2018 | Published: 30 Nov 2017

IBM

The State of Security Automation Architectures: Consolidated Key Findings
sponsored by Juniper Networks
RESEARCH CONTENT: Learn about the growing importance of a security automation architecture to cybersecurity by exploring some of the Ponemon Institute's key findings about the role of automation in incident response, security analytics, SIEM, and more.
Posted: 17 Jul 2018 | Published: 30 Apr 2018

Juniper Networks

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

5 Key Steps for GDPR Compliance
sponsored by Plixer
RESOURCE: Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.
Posted: 11 Jul 2018 | Published: 02 Jul 2018


Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Why You Should Take Security in the Cloud
sponsored by Splunk
WHITE PAPER: This white paper highlights the benefits of running a security analytics platform in the cloud and explores the power of big data analytics and cloud-based security.
Posted: 29 Jun 2018 | Published: 29 Dec 2017

Splunk

How to Protect Against the Top 5 Cyberattacks
sponsored by Arctic Wolf
WHITE PAPER: Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Arctic Wolf

How Machine Data Supports GDPR Compliance
sponsored by Splunk
WHITE PAPER: Discover 3 machine data use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment model – whether it's on-premise, in the cloud, or hybrid.
Posted: 26 Jun 2018 | Published: 31 Dec 2017

Splunk

Configure Security Policies for Endpoints & End-Users with Confidence
sponsored by IBM
RESOURCE CENTER: In this custom resource center, find out how your unified endpoint management (UEM) strategy can help you simplify policy configuration and enforcement.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

IBM

SSL Attacks on the Rise
sponsored by Radware
EBOOK: Better arm yourself against SSL threats by learning about the different types of encrypted attacks, leading SSL vulnerabilities, your options for SSL protection, and more.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Radware

Mobile Encryption Provider Turns to Cloud Security Services to Secure Customers' Privacy
sponsored by Radware
CASE STUDY: When hit with a series of massive multi-vector DDoS attacks, leading encryption provider Myntex experienced severe service interruptions that negatively impacted its customers. In this case study, find out how Myntex adopted cloud security services in order to step up their protection against multi-vector threats.
Posted: 19 Jun 2018 | Published: 30 Jun 2016

Radware

How to Mitigate 5 Network Security Problems Affecting the Financial Industry
sponsored by Ixia - Keysight
WHITE PAPER: Find out how high-priority targets like financial industry organizations can overcome 5 critical IT security challenges, from reducing cybertheft to improving compliance.
Posted: 29 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

Coordinate Network Security Tools for a Unified Defense
sponsored by Ixia - Keysight
WHITE PAPER: Find out how to extend the reach of security tools to access the entire network, coordinating intrusion prevention/detection systems (IPS/IDS), data loss prevention (DLP), and firewalls into a single, staunch line of defense.
Posted: 28 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight
1 - 25 of 740 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement