IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed   
Security Network Reports
 
Defending Against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: While Transport Layer Security improves security for web traffic, it comes at a price—increased workload demand and the potential hazards of malware cloaked in encrypted traffic. In this white paper, learn how F5 SSL Orchestrator can help your business drive insight into encrypted traffic.
Posted: 15 Feb 2019 | Published: 30 Sep 2018

F5 Networks

Travis Perkins PLC Adopts Analytics-Driven SIEM to Enable Hybrid Cloud Transition
sponsored by Splunk Services UK Ltd
CASE STUDY: Travis Perkins PLC's existing SIEM solution couldn't provide the necessary security insights across its hybrid environment. They reviewed the alternatives available and selected the Splunk platform as their new SIEM. In this case study, discover the benefits that Travis Perkins PLC has seen since deploying the Splunk platform.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Splunk Services UK Ltd

ALTR's Transformational, Blockchain-Based Data Security Platform Neutralizes the Privacy and Breach Exposures Created by the People Inside of Networks.
sponsored by ALTR
RESOURCE: Data risk is a part of almost every urgent technology conversation in the enterprise. Most issues are a result of the humans that are inextricable parts of our networks. Fortunately, the ALTR platform reduces data risks to virtually zero. In this white paper, learn how ALTR's platform provides visibility control and protection over valuable data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

ALTR

What Attacks Aren't You Seeing?
sponsored by Cisco Umbrella
RESOURCE: We work everywhere, yet traditional network security solutions still focus on protecting employees while on the corporate network. In this resource, learn about the risks of only relying on legacy defenses. Also, discover how Cisco Umbrella can help your organization by providing visibility into all internet requests across your network.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Cisco Umbrella

Innovation Insight for Remote Browser Isolation
sponsored by Menlo Security
RESEARCH CONTENT: The public internet is a cesspool of attacks, many of which are delivered to enterprise users through browsing the web. Attackers are bypassing preventative controls, such as signature-based malware scanning, firewalls and secure web gateways. In this research report, explore key findings and from Garter's research on web-based attacks.
Posted: 18 Feb 2019 | Published: 08 Mar 2018

Menlo Security

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

Neustar Security Solutions Overview
sponsored by Neustar
WHITE PAPER: Learn about Neustar and their approach to DNS and security. Tap into this resource to find out how you can maintain network performance while tightening security for key areas, like DDoS protection and identity assurance.
Posted: 13 Feb 2019 | Published: 15 Jan 2018

Neustar

Why Every Business Needs a Smart Printing Services Strategy
sponsored by HP
RESOURCE: Network-connected printers are more insecure than most organizations realize. With security threats on the rise businesses of all sizes need printing services strategies to protect their organizations and minimize risk. In this article, learn how to craft a printer services strategy.
Posted: 15 Mar 2019 | Published: 13 Apr 2017

HP

Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017

Trend Micro, Inc.

Bug Bounty Field Manual
sponsored by HackerOne
EBOOK: Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement