Vertical Industries  >  

Security Products Industry

RSS Feed   
Security Products Industry Reports
 
Build a Solutions-Driven Culture with a Modern Identity
sponsored by Hitachi ID
DATA SHEET: Educational institutions must always invest where they’ll see the biggest impact. Digital identity, connecting students and staff to information that builds knowledge, is an opportunity for pivotal efficiency gains – but the hardest part of identity is management. View this data sheet to learn strategies for campus-wide identity management.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Generations of Machine Learning in Cybersecurity
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn the 5 characteristics that define a generation of machine learning and analyze the 5 generations themselves to discover how to improve future machine learning cyber security initiatives.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

BlackBerry

How to Successfully Secure Ecommerce
sponsored by Rackspace
WEBCAST: With more and more business transacted online, and with cyberthreats growing more and more complex, businesses need to find ways to optimize the performance of their websites without compromising security or falling short of compliance. Watch this webinar presented by Rackspace and Akamai for a guide through this challenge.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Rackspace

Email Security for Microsoft 365
sponsored by Vade Secure
WHITE PAPER: Cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. You may have enabled email security add-ons for Microsoft 365, but you’re not as safe as you think. Read this white paper to learn how to keep your email safe from phishing, spear phishing and zero-day attacks.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Don't be Afraid of Cloud Security
sponsored by Apcela
WEBCAST: The push to move applications and services to the cloud often opens security vulnerabilities that you read about as headlines. Conversely, the fear of these security events results in network policy that inhibits the speed and performance of business. Watch this webcast for a discussion on balancing speed and security from a CIO’s perspective.
Posted: 07 Oct 2020 | Premiered: Oct 31, 2019

Apcela

AI-Driven EDR
sponsored by BlackBerry
EBOOK: Endpoint detection & response (EDR) is a rapidly evolving technology that continues to outsmart threats outside the network and respond to those within it. Now, the power of artificial intelligence is granting EDR even more capability while lowering cost. Jump into this e-book to get a closer look at AI-driven endpoint detection & response.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

State of Ransomware
sponsored by BlackBerry
ANALYST REPORT: The increased reporting of cyber incidents among large companies in ANZ in the first half of 2020 has been evident. A handful of ransomware families are dominating these attacks. Browse this report to investigate some of the tactics used by these ransomware families, their high profile victims, and strategies used to defend against these threats.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

BlackBerry

Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider
sponsored by GoSecure
RESOURCE: According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner report to learn what these questions are and more.
Posted: 23 Sep 2020 | Published: 31 Oct 2019

GoSecure

Executive Summary: Threat Hunting Made Easy
sponsored by Malwarebytes
RESOURCE: “Threat hunting” may sound like buzzword when you first hear it, but it is a very real practice that allows you to contain suspicious activity, determine if a threat is malicious or benign and remediate with just the click of a button. View this short brief and uncover a threat hunting opportunity your organization could use.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

Proofpoint CASB Adaptive Access Controls
sponsored by Proofpoint
DATA SHEET: Cloud-based networking has enabled never-before-seen flexibility, but the vulnerability of the cloud and the now-widespread use of unmanaged devices has driven security risk through the roof. A CASB is a viable option to help mitigate this risk. Browse this solution brief to understand the technology behind CASB and why it is gaining popularity.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info