IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 535 Matches Previous Page  |  Next Page
How to Capitalize on the Multi-billion Dollar Market for Managed Security Services
sponsored by IBM
WEBCAST: Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

IBM

MSSP Buyer's Guide: Grow Your Managed SOC Business with IBM Security
sponsored by IBM
PRODUCT OVERVIEW: This eBook outlines the benefits of IBM Security's MSSP Partner Program and explains how their threat detection and response solutions can help you capitalize on this unique market opportunity. Download now to learn how this program can help you scale your growth and increase your revenue potential.
Posted: 07 Jun 2019 | Published: 28 Feb 2019

IBM

Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime
sponsored by Unitrends
WHITE PAPER: This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.
Posted: 01 May 2019 | Published: 01 May 2019

Unitrends

Barracuda Cloud Security Guardian
sponsored by Barracuda
PRODUCT OVERVIEW: Barracuda's Cloud Security Guardian automatically optimizes and remediates security controls to ensure continuous compliance for workloads and apps hosted in the public cloud. To learn how your enterprise can benefit from automated cloud security measures, access it here.
Posted: 24 Apr 2019 | Published: 24 Apr 2019

Barracuda

Break the Link Between Users and Cyber Threats
sponsored by Avast Business
WHITE PAPER: Because SMBs rarely have the resources to build intricate anti-malware solutions, your organization is uniquely positioned to step in and offer those necessary security layers. This white paper highlights a secure web gateway (SWG) that can help you do so. Read on for 5 main benefits and how it delivers added value for service providers.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Avast Business

Next-Generation Device Security is Essential for Healthcare Providers
sponsored by Lenovo and Intel
RESOURCE: This custom article takes a look at recent cyberattacks: breaking down where they originate, who they target, and how they operate. Find out how you can bolster your security posture by strengthening your device protection and authentication tools.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Lenovo and Intel

The Transparent Managed Security Handbook
sponsored by Expel
EBOOK: Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.
Posted: 28 Mar 2019 | Published: 28 Mar 2019

Expel

Where to Invest Next to Mature Cybersecurity
sponsored by CrowdStrike
WHITE PAPER: To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

CrowdStrike

Multi-pronged approach to cyber security professional development
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ComputerWeekly.com

2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Radware

Network Security that's Built Right In
sponsored by 128 Technology
WHITE PAPER: Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully distributed firewall protection, and more.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

128 Technology

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by Corelight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

Corelight

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Closing the Cybersecurity Gap
sponsored by Splunk
: Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Splunk

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Securing your Workforce across Cloud and Mobile
sponsored by Forcepoint
EBOOK: In this e-book, get tips on how to evaluate your CASB and overcome the leading cybersecurity challenges in cloud and mobile-first environments.
Posted: 26 Oct 2018 | Published: 31 Dec 2017

Forcepoint

Solving the Financial Services Security Talent Shortage with Managed Detection
sponsored by Arctic Wolf
WEBCAST: This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

SOC-as-a-Service for Financial Institutions
sponsored by Arctic Wolf
WHITE PAPER: Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

No Business Is Too Small a Target for Hackers
sponsored by Arctic Wolf
WHITE PAPER: Find out how SMBs, despite the fact that they lack the resources and skilled experts that many of their larger contemporaries have, can step up their defense against hackers with measures like security operations center as a service (SOCaaS).
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Arctic Wolf

Cybersecurity Essentials Every Law Firm Needs
sponsored by Arctic Wolf
WHITE PAPER: Organizations like law firms possess vast quantities of highly sensitive information that puts them at the top of hackers' hit lists. Learn about 5 essential security capabilities for protecting company and client data that every firm must have.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

Forcepoint Cloud Access Security Broker (CASB) Assessment
sponsored by Forcepoint
RESEARCH CONTENT: This ESG report examines the Forcepoint Cloud Access Security Broker (CASB) to assess its ability to secure the use of any cloud apps across an organization's users and endpoints. Explore ESG's findings and discover how Forcepoint's CASB performs in terms of visibility, risk management, and protection.
Posted: 06 Sep 2018 | Published: 31 Mar 2018

Forcepoint

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio
1 - 25 of 535 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement