Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 525 Matches Previous Page  |  Next Page
Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Predictive Analytics in Defense and Security
sponsored by Dataiku
EBOOK: Data is growing exponentially, but insights from that data are growing linearly because people alone can't keep up. This is where machine learning and AI come in to play. This e-book details the challenges you'll face in defense and security, and offers a powerful solution.
Posted: 04 Jan 2019 | Published: 31 Dec 2017

Dataiku

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).
Posted: 06 Dec 2018 | Premiered: 31 Dec 2018

Arctic Wolf

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service
sponsored by Arctic Wolf
VIDEO: SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.
Posted: 06 Dec 2018 | Premiered: 31 Dec 2018

Arctic Wolf

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Choosing the WAF That's Right for You
sponsored by F5 Networks
EBOOK: The Verizon Data Breach Investigations Report reveals that in 2017, there were more than 2,200 confirmed data breaches. Web Application Firewalls (WAFs) can help to mitigate these breaches, but how do you pick the right one? Ask yourself these 4 questions to find out.
Posted: 27 Sep 2018 | Published: 27 Sep 2018

F5 Networks

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Learn how your organization can achieve reduced alert noise, real-time threat monitoring, automated decision-making investigation, and more with this SIEM platform.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Empow Cyber Security

Bringing Security to the Perimeter of your Cloud Network
sponsored by Cisco Umbrella
WHITE PAPER: With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.
Posted: 07 Sep 2018 | Published: 31 May 2016

Cisco Umbrella

How Yelp Securely Connects People with Great Local Businesses
sponsored by Cisco Umbrella
CASE STUDY: At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.
Posted: 31 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

Using & Protecting Microservices: A Double-edged Sword
sponsored by ThreatX
WHITE PAPER: Microservices and containers are a hot topic right now. While they are making news because of ease of use, there are also challenges associated with protecting them. Read this blog post by Andrew Useckas, CTO of Threat X to learn about a Web Application Firewall platform that can help secure your microservices.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

ThreatX

Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

ComputerWeekly.com

Managed Print Services Solutions & support services
sponsored by Xeretec
BROCHURE: A Managed Print Service (MPS) offers businesses a quick and simple way to reduce costs and improve productivity. But with so many solutions on the market, how do you ensure that your MPS will overcome the unique needs of your organization? Download this brochure to explore the benefits of a personalized MPS.
Posted: 06 Dec 2018 | Published: 31 Dec 2017

Xeretec

Manage Risk and Compliance with ServiceNow GRC
sponsored by ServiceNow
RESOURCE: The global regulatory environment continues to evolve making it imperative for organizations to have an integrated risk program. Are you well-positioned to monitor, prioritize, and automate response to business risks in real time? Learn about ServiceNow GRC – an option that could help you ensure rapid identification and response to risk.
Posted: 05 Dec 2018 | Published: 31 Dec 2018

ServiceNow

Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
WHITE PAPER: End-user-focused security education and training is a rapidly growing market that has experienced a nearly 40% growth from 2016 through 2017. As products within this market mature, each vendor seeks to differentiate its products and services in a variety of ways. This white paper compares the strengths and cautions of many important vendors.
Posted: 05 Dec 2018 | Published: 13 Nov 2018

MediaPRO

TLS 1.3: Are you Ready?
sponsored by F5 Networks
WHITE PAPER: Read this white paper to discover a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

F5 Networks

Forcepoint Cloud Access Security Broker (CASB)
sponsored by Forcepoint
ANALYST REPORT: ESG Lab evaluated the Forcepoint Cloud Access Security Broker (CASB) to validate how it secures the use of any cloud applications across an organization's users and endpoints. Discover how Forcepoint CASB helps organizations minimize security vulnerabilities in three key areas.
Posted: 25 Oct 2018 | Published: 31 Mar 2018

Forcepoint

VxRail Cybersecurity Solutions Overview
sponsored by Dell EMC and VMware
PRODUCT OVERVIEW: Access this sheet for an overview of a resilient hyper-converged infrastructure option ideal for keeping virtualization environments secure. The system includes extensive levels of encryption to protect the confidentiality of data in use, in motion, and at rest; safeguard the entire data store, and protect VMs.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Dell EMC and VMware

Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
RESOURCE: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Splunk

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Download this infographic to learn about Citrix's Secure Digital Workspace, a software defined perimeter that combines secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

Tailoring Intelligence for Automated Response
sponsored by IntSights
ANALYST REPORT: In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

IntSights
1 - 25 of 525 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement