Standards  >  

Security Protocols

RSS Feed   
Security Protocols Reports
 
Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

TOPICS: 
Arctic Wolf

How to Proactively Prevent Security Threats across Endpoints
sponsored by Cylance
RESEARCH CONTENT: This Forrester Total Economic Impact Report investigates the effect of Cylance on organizations' ability to protect their critical assets and endpoints.
Posted: 29 Aug 2018 | Published: 28 Feb 2018

TOPICS: 
Cylance

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

TOPICS: 
InteliSecure

No Business Is Too Small a Target for Hackers
sponsored by Arctic Wolf
WHITE PAPER: Find out how SMBs, despite the fact that they lack the resources and skilled experts that many of their larger contemporaries have, can step up their defense against hackers with measures like security operations center as a service (SOCaaS).
Posted: 10 Sep 2018 | Published: 10 Sep 2018

TOPICS: 
Arctic Wolf

5 Categories of Questions for Evaluating AI-Driven Security Tools
sponsored by Cylance
WHITE PAPER: With countless numbers of security tools boasting "AI and machine learning capabilities," AI has become something of a buzzword in the security world. But sometimes, there's some truth to the hype. Get tips on how to effectively evaluate AI-based security tools by learning about 5 useful categories of questions to ask.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

TOPICS: 
Cylance

Akamai Cloud Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about Akamai's cloud-based approach to security that leverages 24/7 monitoring to collect and analyze terabytes of attack data, bot requests, and IP addresses to solidify your defenses. Plus, discover 7 keys to reducing your attack surface.
Posted: 12 Oct 2018 | Published: 31 Mar 2018

TOPICS: 
Akamai Technologies

Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

TOPICS: 
ComputerWeekly.com

Passive DNS for Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn about passive DNS tools that are designed to help corporate security teams to leverage their existing threat intelligence data better by adding critical contextual information.
Posted: 23 May 2018 | Published: 31 Dec 2017

TOPICS: 
Farsight Security

Symantec Secures Rockwell Automation Industrial Control and Business Intelligence Solutions
sponsored by Symantec
CASE STUDY: Industrial control systems have become a major focus for attacks and are now among the top targeted sectors. To help address the risk to computer-based endpoints in automation systems, Rockwell Automation partnered with Symantec Corporation to provide endpoint level security. Download this case study to learn more about the partnership.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

Data protection: A business imperative
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 24 Apr 2018 | Published: 24 Apr 2018

TOPICS: 
ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement