Standards  >  

Security Protocols

RSS Feed   
Security Protocols Reports
 
3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

The Predictive Advantage against Malware: It's About Time
sponsored by Cylance
RESOURCE: Find out how preventative, proactive security platforms like CylancePROTECT can help combat against increasingly advanced malware threats – both known and unknown.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cylance

Increase Visibility into SSL Encryption to Boost Security
sponsored by F5 Networks
WHITE PAPER: Regaining visibility into encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business. Find out how SSL/TLS orchestration can help you get that visibility and deliver high-performance decryption and encryption of outbound TLS traffic—without slowing your traffic down.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

F5 Networks

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

Combatting Botnet Traffic with Behavioral Analysis
sponsored by ThreatX
RESOURCE: Find out how to detect and block a number of different distributed attacks with a robust security approach that's designed to grant you visibility into malicious traffic.
Posted: 29 Aug 2018 | Published: 28 Jun 2018

ThreatX

Coordinate Network Security Tools for a Unified Defense
sponsored by Ixia - Keysight
WHITE PAPER: Find out how to extend the reach of security tools to access the entire network, coordinating intrusion prevention/detection systems (IPS/IDS), data loss prevention (DLP), and firewalls into a single, staunch line of defense.
Posted: 28 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

How to Mitigate 5 Network Security Problems Affecting the Financial Industry
sponsored by Ixia - Keysight
WHITE PAPER: Find out how high-priority targets like financial industry organizations can overcome 5 critical IT security challenges, from reducing cybertheft to improving compliance.
Posted: 29 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM

Fighting Fraud with Intelligent Access Management
sponsored by IBM
WHITE PAPER: Find out how you can become a leader in the fight against fraud with intelligent access management and authorization, designed for holistic fraud prevention.
Posted: 24 Jul 2018 | Published: 31 Jul 2016

IBM

Protecting Microservices and APIs with ABAC, OAuth and OpenID Connect
sponsored by Axiomatics
WHITE PAPER: This resource outlines a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone. Find out how your organization can combine security capabilities to separate privacy concerns and more.
Posted: 17 Jun 2018 | Published: 15 Jun 2018

Axiomatics
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement