Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 517 Matches Previous Page  |  Next Page
Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 23 Jan 2018 | Published: 03 Aug 2017

Splunk

Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Unified Threat Management: A Modern Solution to a Modern Problem
sponsored by Seqrite
WHITE PAPER: Read this white paper to learn why traditional methods of network protection are no longer sufficient to keep your data safe from today's advanced threats. Then, discover unified threat protection which uses a single appliance to perform many security functions.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Threats Posed by Portable Storage Devices
sponsored by Seqrite
WHITE PAPER: In this white paper, find out if security policies alone are the best solution to mitigate the risks posed by portable storage devices, as well as explore some of the threats that these devices pose if they go uncontrolled.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

Protecting Your Enterprise from Ransomware Attacks
sponsored by Seqrite
WHITE PAPER: Click inside to take a more in-depth look at what makes a ransomware attack unique, and why you need to take steps to protect yourself. Then, learn about 5 protection mechanisms you can put into place.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

CW Europe – December 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 07 Dec 2017 | Published: 14 Dec 2017

ComputerWeekly.com

The Tug of War Between UBA and SIEM
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

Next-Generation Firewalls: The Cornerstone of Future Security
sponsored by Palo Alto Networks
WHITE PAPER: Learn about one next-gen firewall that combines network, cloud and endpoint security capabilities, and enables them all with threat intelligence to help prevent cyber breaches. Read on to find 6 key abilities of this strategy.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Palo Alto Networks

The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Mid-Year Cybersecurity Report 2017
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Cisco Systems, Inc.

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

Security Investigations: The Importance of Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

Moving from Vulnerability Management to Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: Watch this webcast to uncover how Seton Hall University went from using spreadsheets for tracking vulnerability information to a new approach to vulnerability response.
Posted: 31 Aug 2017 | Premiered: Jul 11, 2017

ServiceNow

The Australian Privacy Amendment Explored
sponsored by Rapid7
DATA SHEET: Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Rapid7

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid

Discover True Advanced Threat Detection
sponsored by Microsoft
RESOURCE: In this infographic, explore a service that enables you to detect, investigate and respond to complex targeted attacks on your networks.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Microsoft

Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive
sponsored by Oracle Corporation
WHITE PAPER: In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way
Posted: 15 Sep 2017 | Published: 17 Nov 2017

Oracle Corporation

How You can Secure the Use of Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Symantec

Combining Data Loss Protection with Cloud Access Security Broker Technology
sponsored by Symantec
WHITE PAPER: Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

Symantec

IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella
1 - 25 of 517 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement