Vertical Industries  >  

Security Products Industry

RSS Feed   
Security Products Industry Reports
 
CyberConverged Storage: An Overview
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

The Most Common Types of Invoice Fraud and How to Prevent Them
sponsored by AppZen
WHITE PAPER: How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

AppZen

Keeping Users Safe from Advanced Threats and Unsolicited Content
sponsored by Barracuda Networks
PRODUCT OVERVIEW: How can you stop advanced malware from breaching your network perimeter and stealing your valuable data? The following paper explains how to confront—and thwart—these threats using a cloud-based firewall that combines multiple layers of detection for all threat vectors with on-the-fly sandbox execution of unknown files.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Manage your End-of-Life IT Assets Securely and Responsibly
sponsored by Iron Mountain
DATA SHEET: As organizations migrate to new technologies to innovate, drive efficiencies and enable new ways of working, they can't simply throw their old IT and office equipment in the bin. Security must stay top of mind. Download this brief to learn about Iron Mountain's Secure IT Asset Disposition Service.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Iron Mountain

Consumer Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Consumer authentication services enable online retailers and eCommerce organizations to shift away from passwords, which continue to pose a security risk. This report highlights some of the key players and offerings in the consumer authentication market, as well as a guide for choosing the right vendor. Read on to learn more.
Posted: 02 Apr 2020 | Published: 26 Sep 2019

Ping Identity Corporation

Cyber security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Efficient Threat Remediation with Check Point and ServiceNow
sponsored by ServiceNow
RESOURCE: Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

How Should Companies Across the Globe Prepare for EU GDPR Compliance?
sponsored by Commvault
EGUIDE: As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance
Posted: 30 Aug 2017 | Published: 21 Aug 2017

Commvault

4 Tech Disruptors that Could Radically Change Security Operations
sponsored by SearchSecurity.com
EZINE: Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
Posted: 01 Aug 2017 | Published: 01 Aug 2017

SearchSecurity.com

A Look at the Shared Responsibility Model for Cloud Providers
sponsored by SolarWinds, Inc.
EGUIDE: Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info