Vertical Industries  >  

Security Products Industry

RSS Feed   
Security Products Industry Reports
 
What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Understanding and Preventing Finance Phishing Fraud
sponsored by Barracuda
WEBCAST: Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.
Posted: 24 May 2019 | Premiered: May 24, 2019

Barracuda

FineLine Technologies Secures Its Multi-location Network with Barracuda
sponsored by Barracuda Networks
CASE STUDY: FineLine Technologies struggled to find a robust firewall system that could be easily deployed across their global offices. This case study covers FineLine's journey and demonstrates how they found a firewall that could secure data across their globally dispersed network.
Posted: 15 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Overview of Barracuda Advanced Threat Protection
sponsored by Barracuda Networks
WHITE PAPER: The following white paper highlights a multi-layer advanced threat protection approach designed to defend against all threat vectors and across multiple deployment surfaces. Read on to see how your organization could benefit from this four-layered approach.
Posted: 15 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition
sponsored by CyberArk Software, Inc
EBOOK: Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

CyberArk Software, Inc

Lockdown Lessons
sponsored by Webroot
WHITE PAPER: Network security is the immune system of an organization. If a business does not maintain a healthy immune system, then it’s vulnerable to a host of rapidly evolving threats. If you want to learn how to best secure your network, read this white paper from Webroot, which details best practices and innovative methods of protection.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence
sponsored by Cisco Umbrella
EBOOK: As technology enables organizations to improve the way they do business, the cybersecurity landscape evolves to reflect this change – both in terms of cyberattacks and security tactics. This e-book highlights the top cybersecurity trends of 2020, designed to guide organizations towards a secure network, today and in the years to come.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Cisco Umbrella

EDR: The Case for Automation and Simplification
sponsored by Kaspersky Lab
WHITE PAPER: Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Kaspersky Lab

IT Priorities 2018 - What's happening in security?
sponsored by ComputerWeekly.com
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 02 May 2018 | Premiered: 02 May 2018

ComputerWeekly.com

SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AT&T Cybersecurity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info