Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 524 Matches Previous Page  |  Next Page
The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Organizations are purchasing more and more security systems due to the increased volume of advanced cyberattacks. While SIEM systems are supposed to help this problem, some aren't meeting expectations. Read on to learn about a new SIEM platform that is used, and loved, by MIT Media Labs and other innovative companies.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Empow Cyber Security

Bringing Security to the Perimeter of your Cloud Network
sponsored by Cisco Umbrella
WHITE PAPER: With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.
Posted: 07 Sep 2018 | Published: 31 May 2016

Cisco Umbrella

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Download this infographic to learn about Citrix's Secure Digital Workspace, a software defined perimeter that combines secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

How Yelp Securely Connects People with Great Local Businesses
sponsored by Cisco Umbrella
CASE STUDY: At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.
Posted: 31 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

Using & Protecting Microservices: A Double-edged Sword
sponsored by ThreatX
WHITE PAPER: Microservices and containers are a hot topic right now. While they are making news because of ease of use, there are also challenges associated with protecting them. Read this blog post by Andrew Useckas, CTO of Threat X to learn about a Web Application Firewall platform that can help secure your microservices.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

ThreatX

Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

Analytics-Driven Security in Government
sponsored by Splunk
RESOURCE: To help combat increasing security threats due to added IT complexity, analytics-driven security operations models are being used to enhance the ability to detect, prevent, respond, and predict threats at machine speeds. Download this resource to find out more about this security strategy.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Splunk

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

ComputerWeekly.com

Tailoring Intelligence for Automated Response
sponsored by IntSights
ANALYST REPORT: In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

IntSights

Fraud Management Solution Buyer's Kit
sponsored by Riskified
WHITE PAPER: Using e-commerce can make you more accessible to customers but also raise the threat of fraud. Lower the risk by implementing a fraud management solution that can help actively monitor and prevent fraudulent activity. Download this comprehensive guide to selecting the best fraud solution for you.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Riskified

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Splunk

7 Reasons to Move to SaaS Data Protection
sponsored by Digital Guardian
WHITE PAPER: Protecting sensitive data is a constant, non-stop process for security professionals. Download to discover 7 reasons why you should turn to a dedicated SaaS for your data protection
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Digital Guardian

Secure On- and Off- Premises IT Service Delivery Platforms
sponsored by Hewlett Packard Enterprise
EBOOK: Learn how to protect your most organizationally critical digital assets and their interactions, regardless of location or device. Download this eBook so you can adhere to these security checklists.
Posted: 16 Jul 2018 | Published: 31 Oct 2017

Hewlett Packard Enterprise

McAfee Cloud Security for Salesforce
sponsored by McAfee, Inc.
WHITE PAPER: McAfee® Skyhigh Security Cloud for Salesforce helps organizations securely accelerate their business by providing total control over data and user activity in Salesforce. Learn more about 25 key features of the software in this data sheet.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

McAfee, Inc.

Protect Your Mainframe from the Inside Out
sponsored by CA Technologies
RESOURCE: 77% of data breaches come from internal sources, according to the Ponemon Institute. While it would be nice to trust your employees with your mainframe of data, this is not a wise decision. Download this resource to discover how an access management system can protect your mainframe from internal data breaches.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

Application security: More important than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

ComputerWeekly.com

Think beyond the traditional approach to security
sponsored by Cylance
VIDEO: Always being a step behind the hackers is a losing battle – it's time to think beyond the traditional approach of security and consider a new prevention strategy.
Posted: 07 Jun 2018 | Premiered: 30 Jan 2018

Cylance

Real-Time Risk Detection: Addressing the Challenge of False Positives using Machine Learning
sponsored by TIBCO
WHITE PAPER: Due to legislation, market dynamics, and sophisticated risk management strategies, artificial intelligence and detection systems are as important as ever in combating fraud. This white paper details the benefits of a dynamic detection system in your business.
Posted: 04 Jun 2018 | Published: 26 Mar 2018


Data Secrets Revealed: A Collection Of Security Customer Stories
sponsored by Splunk
RESOURCE: Find out how you can improve Security Operations and identify, prioritize and manage security events with alert management, risk scores, and customizable dashboards and visualizations.
Posted: 31 May 2018 | Published: 31 May 2018

Splunk

Ins and Outs of Setting up a SOC
sponsored by Respond Software
EGUIDE: Find out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.
Posted: 29 May 2018 | Published: 25 May 2018

Respond Software

Managed Antivirus: Blocking All Viruses, Both Old and New
sponsored by Solarwinds MSP
WHITE PAPER: In this white paper explore a new remote monitoring and management (RMM) software that uses traditional signature-based protection to keep you safe from known threats, while simultaneously using exploratory checks and behavioral scans to hunt down new viruses.
Posted: 29 May 2018 | Published: 29 May 2018

Solarwinds MSP

Responding Efficiently to Major Data Breaches
sponsored by Nuix
WHITE PAPER: In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Nuix

Integrating IAM into your Digital Workspace
sponsored by Citrix
EGUIDE: Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
Posted: 30 May 2018 | Published: 24 May 2018

Citrix

SQL Server Security Practices
sponsored by Idera
WHITE PAPER: Explore some common security practices and how your organization can implement security measures within their deployment of SQL Server.
Posted: 11 May 2018 | Published: 11 May 2018

Idera
1 - 25 of 524 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement