Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 526 Matches Previous Page  |  Next Page
Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Forcepoint Cloud Access Security Broker (CASB)
sponsored by Forcepoint
ANALYST REPORT: ESG Lab evaluated the Forcepoint Cloud Access Security Broker (CASB) to validate how it secures the use of any cloud applications across an organization's users and endpoints. Discover how Forcepoint CASB helps organizations minimize security vulnerabilities in three key areas.
Posted: 25 Oct 2018 | Published: 31 Mar 2018

Forcepoint

Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
RESOURCE: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Splunk

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Organizations are purchasing more and more security systems due to the increased volume of advanced cyberattacks. While SIEM systems are supposed to help this problem, some aren't meeting expectations. Read on to learn about a new SIEM platform that is used, and loved, by MIT Media Labs and other innovative companies.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Empow Cyber Security

Bringing Security to the Perimeter of your Cloud Network
sponsored by Cisco Umbrella
WHITE PAPER: With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.
Posted: 07 Sep 2018 | Published: 31 May 2016

Cisco Umbrella

How Yelp Securely Connects People with Great Local Businesses
sponsored by Cisco Umbrella
CASE STUDY: At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.
Posted: 31 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

Using & Protecting Microservices: A Double-edged Sword
sponsored by ThreatX
WHITE PAPER: Microservices and containers are a hot topic right now. While they are making news because of ease of use, there are also challenges associated with protecting them. Read this blog post by Andrew Useckas, CTO of Threat X to learn about a Web Application Firewall platform that can help secure your microservices.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

ThreatX

Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

ComputerWeekly.com

Fraud Management Solution Buyer's Kit
sponsored by Riskified
WHITE PAPER: Using e-commerce can make you more accessible to customers but also raise the threat of fraud. Lower the risk by implementing a fraud management solution that can help actively monitor and prevent fraudulent activity. Download this comprehensive guide to selecting the best fraud solution for you.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Riskified

7 Reasons to Move to SaaS Data Protection
sponsored by Digital Guardian
WHITE PAPER: Protecting sensitive data is a constant, non-stop process for security professionals. Download to discover 7 reasons why you should turn to a dedicated SaaS for your data protection
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Digital Guardian

Application security: More important than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

ComputerWeekly.com

Think beyond the traditional approach to security
sponsored by Cylance
VIDEO: Always being a step behind the hackers is a losing battle – it's time to think beyond the traditional approach of security and consider a new prevention strategy.
Posted: 07 Jun 2018 | Premiered: 30 Jan 2018

Cylance

Real-Time Risk Detection: Addressing the Challenge of False Positives using Machine Learning
sponsored by TIBCO
WHITE PAPER: Due to legislation, market dynamics, and sophisticated risk management strategies, artificial intelligence and detection systems are as important as ever in combating fraud. This white paper details the benefits of a dynamic detection system in your business.
Posted: 04 Jun 2018 | Published: 26 Mar 2018


Data Secrets Revealed: A Collection Of Security Customer Stories
sponsored by Splunk
RESOURCE: Find out how you can improve Security Operations and identify, prioritize and manage security events with alert management, risk scores, and customizable dashboards and visualizations.
Posted: 31 May 2018 | Published: 31 May 2018

Splunk

VxRail Cybersecurity Solutions Overview
sponsored by Dell EMC and VMware
PRODUCT OVERVIEW: Access this sheet for an overview of a resilient hyper-converged infrastructure option ideal for keeping virtualization environments secure. The system includes extensive levels of encryption to protect the confidentiality of data in use, in motion, and at rest; safeguard the entire data store, and protect VMs.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Dell EMC and VMware

Choosing the WAF That's Right for You
sponsored by F5 Networks
EBOOK: The Verizon Data Breach Investigations Report reveals that in 2017, there were more than 2,200 confirmed data breaches. Web Application Firewalls (WAFs) can help to mitigate these breaches, but how do you pick the right one? Ask yourself these 4 questions to find out.
Posted: 27 Sep 2018 | Published: 27 Sep 2018

F5 Networks

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Download this infographic to learn about Citrix's Secure Digital Workspace, a software defined perimeter that combines secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

Tailoring Intelligence for Automated Response
sponsored by IntSights
ANALYST REPORT: In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

IntSights

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Splunk

Secure On- and Off- Premises IT Service Delivery Platforms
sponsored by Hewlett Packard Enterprise
EBOOK: Learn how to protect your most organizationally critical digital assets and their interactions, regardless of location or device. Download this eBook so you can adhere to these security checklists.
Posted: 16 Jul 2018 | Published: 31 Oct 2017

Hewlett Packard Enterprise

McAfee Cloud Security for Salesforce
sponsored by McAfee, Inc.
WHITE PAPER: McAfee® Skyhigh Security Cloud for Salesforce helps organizations securely accelerate their business by providing total control over data and user activity in Salesforce. Learn more about 25 key features of the software in this data sheet.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

McAfee, Inc.

Protect Your Mainframe from the Inside Out
sponsored by CA Technologies
RESOURCE: 77% of data breaches come from internal sources, according to the Ponemon Institute. While it would be nice to trust your employees with your mainframe of data, this is not a wise decision. Download this resource to discover how an access management system can protect your mainframe from internal data breaches.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

Integrating IAM into your Digital Workspace
sponsored by Citrix
EGUIDE: Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
Posted: 30 May 2018 | Published: 24 May 2018

Citrix
1 - 25 of 526 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement