Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 384 Matches Previous Page  |  Next Page
The Risk Conversation
sponsored by IT Glue
EBOOK: This e-book provides guidelines for having the risk conversation with your clients and how it can benefit you as an MSP. Download now for more info on the 4 pillars of risk management, using risk assessments in sales and QBRs, and more
Posted: 21 Feb 2020 | Published: 21 Feb 2020

IT Glue

Product Overview
sponsored by Armorblox
PRODUCT OVERVIEW: In this product overview, take a closer look at the capabilities and features of Armorblox: A cloud-native email security platform that addresses the inbound and outbound security threats plaguing today’s email platforms. Read on to learn more.
Posted: 20 Feb 2020 | Published: 05 Feb 2020

Armorblox

Open and Dark Web Research: Tips and Techniques
sponsored by Authentic8, Inc.
WHITE PAPER: In this white paper, get an insider look into the Silo Researcher Toolbox, which provides investigators with the necessary capabilities to conduct secure research on the open and dark web without risking the exposure of your resources or your identity. Read on to learn more.
Posted: 18 Feb 2020 | Published: 29 Oct 2019

Authentic8, Inc.

Privileged Access Credential Management for Loosely Connected Devices
sponsored by Cyber-Ark Software
DATA SHEET: The rise of privileged access and mobile endpoints has enabled organizations to improve their business operations. However, these accounts are vulnerable to attacks, requiring deliberate security planning. Download this data sheet to take a closer look at the features and benefits of the CyberArk Privileged Access Security Solution.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Cyber-Ark Software

Malwarebytes Cut Potential Downtime to a Matter of Hours Rather than Weeks
sponsored by Malwarebytes
CASE STUDY: In this case study, discover how Neoperl, a global IT company operating in Europe, partnered with Malwarebytes to address challenges related to system downtime, that resulted in cost savings, complete remediation of threats, and minimized downtime and disruptions.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Malwarebytes

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

4 Ways to Leverage the MITRE ATT&CK Framework in Your Security Operations
sponsored by D3 Security
WHITE PAPER: While the MITRE ATT&CK Framework is popular amongst security professionals, many teams struggle to get optimize its efficiency. In this white paper, learn 4 ways your security team can incorporate the MITRE ATT&CK Framework into your operations.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

D3 Security

Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Abusing Code Signing for Profit
sponsored by Chronicle
WHITE PAPER: Code signing was originally developed as way of guaranteeing the authenticity of a published file. However, given that this process is based on trust, it can be easily manipulated by skilled hackers. Download this white paper to unlock the results of a recent study into this issue and discover where the key concerns lie.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Case Study: Quanta Services
sponsored by Chronicle
CASE STUDY: In this case study, join James Stinson, VP of IT at Quanta Services, a skilled workforce contractor in North America, as he highlights the company’s journey towards cybersecurity and their partnership with Chronicle to establish a security analytics platform.
Posted: 10 Feb 2020 | Published: 31 Oct 2019

Chronicle

L.A. Tourism and Convention Board
sponsored by Absolute Software Corporation
CASE STUDY: As a non-profit organization, LA Tourism’s IT team is under tremendous pressure to ensure security while remaining efficient with limited resources. Download this case study and follow LA Tourism’s journey as they partner with Absolute to establish a security strategy that improved compliance and network visibility.
Posted: 07 Feb 2020 | Published: 06 May 2019

Absolute Software Corporation

All Clouds Are Not Equal
sponsored by Forcepoint
EBOOK: When it comes to cloud security, there are a good deal of misconceptions that persist.In fact, security concerns are usually the main reason why an organization stays away from cloud. In this e-book, debunk the 5 most common cloud security misconceptions and learn what to look for in a cloud-based security solution.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Australian Insurance provider establishes comprehensive risk management program
sponsored by ServiceNow
CASE STUDY: In this case study, follow the journey of MLC Life Insurance, a leading Australian insurance provider, as they partner with ServiceNow to develop & implement a comprehensive digital strategy that enables them to enhance customer experience while establishing governance, risk & compliance controls.
Posted: 05 Feb 2020 | Published: 30 Nov 2018

ServiceNow

Is Having Too Many Apps Expanding your Threat Surface?
sponsored by F5 Networks
WHITE PAPER: According to a recent IDG study, the average company has 1,742 business apps in their environment – making some wonder: Is this too many? How many is too many? What are the risks, if any, of too many applications? Download this white paper to uncover answers to these questions & more.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

F5 Networks

Complexity in Cybersecurity Report 2019
sponsored by IBM
WHITE PAPER: The evolving nature of security has led organizations to adopting a wide array of disjointed security tools. This overly siloed environment leads to complexity, which ultimately affects overall security efficacy. In this report, uncover results from a Forrester study into the current state of security complexity & the effect it’s having.
Posted: 04 Feb 2020 | Published: 31 May 2019

IBM

Cyber Threat Intelligence
sponsored by DomainTools
RESOURCE: As cyberattacks become more sophisticated and difficult to detect, proactive approaches to threat management are no longer viable for ensuring network security. In this solution brief, discover a proactive approach to threat intelligence that helps you identify & monitor threats while building a cyber threat database.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

DomainTools

Detecting Malicious Domains Using Artificial Intelligence and Machine Learning
sponsored by DomainTools
WHITE PAPER: As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

DomainTools

Introducing Egress Risk-based Protection
sponsored by Egress Software Technologies Inc
VIDEO: When it comes to email protection, traditional ‘one-size-fits-all approaches are incapable of recognizing the increasingly sophisticated attacks & risks. In this video, take a closer look at Egress’ Risk-based Protection for email security and discover how it can help you identify & mitigate today’s risks.
Posted: 03 Feb 2020 | Premiered: 02 May 2019

Egress Software Technologies Inc

Proofpoint Advanced Email Protection: Analyst Report
sponsored by Proofpoint
WHITE PAPER: As companies continue to rely on email as their primary communication channel, the need for email security becomes a critical priority. According to Forrester, as many as 94% of attacks start with email. In this report, take a closer look at the results of Forrester’s research into the benefits and costs of email security programs.
Posted: 03 Feb 2020 | Published: 31 Oct 2019

Proofpoint

How to Build Out Your Cybersecurity Technology Stack
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: For organizations beginning their journey towards establishing a cybersecurity program, there can be an overwhelming number of vendors to choose from. This white paper is designed to guide organizations as they begin their selection process by providing advice for what to look for when evaluating vendors and service providers.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.

Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats
sponsored by DomainTools
CASE STUDY: In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

DomainTools

Why Your Company Needs Third-Party Solutions for Office 365
sponsored by Egress Software Technologies Inc
WHITE PAPER: Organizations are increasingly turning to Microsoft Office 365 as their preferred collaboration platform. While its convenience is hard to beat, security settings may not be meeting your needs. In this report, discover how your company can achieve security in Office 365 that meets compliance requirements.
Posted: 31 Jan 2020 | Published: 31 Jan 2019

Egress Software Technologies Inc

Stay out of the Headlines
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Cyberattack detection & prevention is critical to maintaining an organization’s network. Too often, data breaches leave an organization and its customers devastated. In this white paper, explore the modern tactics and technologies being used by organizations to avoid headlines and other negative effects of cyberattacks.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Arctic Wolf Networks, Inc.

5 Ways to Prevent Banking App Breaches
sponsored by Data Theorem
WHITE PAPER: Mobile applications are under constant threat from cyberattackers looking to steal customer data, and banking applications are no exception. With data breaches on the rise, organizations need to rethink their security position. This white paper highlights the core vulnerabilities of banking apps and the tools & tactics to prevent breaches.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Data Theorem
1 - 25 of 384 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info