Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 871 Matches Previous Page  |  Next Page
Securing the Remote Revolution
sponsored by AWS & CrowdStrike
EBOOK: Protecting modern remote workforces requires security capabilities that go beyond traditional approaches. This e-book provides an overview of the emerging adversary tactics targeting remote workforces and highlights new and effective cybersecurity strategies for a fully remote world – read on to get started.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

AWS & CrowdStrike

Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

How to Spot a Spear Phishing Email
sponsored by Vade Secure
RESOURCE: The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


Dunkirk Enhances Microsoft 365 Email Security with Vade Secure for Microsoft 365
sponsored by Vade Secure
CASE STUDY: The victim of targeted attacks, the city and urban community of Dunkirk sought to bolster their defenses against email-based cyberattacks. This case study provides an overview of Dunkirk’s selection criteria as well as the results of their email security project – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


The Evolution of Application Fraud
sponsored by F5 Networks
RESOURCE: Cyberattacks targeting business applications have been on the rise in recent years – an issue made exponentially more prominent as web applications grew in popularity due to COVID-19 changes. This resource provides an overview of the evolution of application fraud – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

F5 Networks

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

The key implementation considerations for successful customer identity management
sponsored by Okta
VIDEO: In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

Improving Online Customer Experience with Identity Management
sponsored by Okta
VIDEO: Does the adoption of identity and access management (IAM) affect organizations and users differently? In this video, join 2 distinguished security experts as they overview the affect that IAM can – and will – have on users across digital interactions.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

5 Steps to Making Better Security Decisions
sponsored by ThreatQuotient
WHITE PAPER: The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

ThreatQuotient

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by ThreatQuotient
WHITE PAPER: For the past 5 years, the MITRE ATT&CK project has grown into a cybersecurity staple – organizations and their security teams are adopting ATT&CK frameworks with blinding speed (and for good reason). Read this SANS paper to learn more about MITRE ATT&CK and discover why its popularity has skyrocketed.
Posted: 18 Sep 2020 | Published: 31 Jul 2020

ThreatQuotient

KVC Health Systems Eliminates Email Security Incidents with Vade Secure
sponsored by Vade Secure
CASE STUDY: In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


Learn How to Detect a Phishing Email
sponsored by Vade Secure
RESOURCE: We’ve all come across a poor phishing attempt that was immediately obvious, but cybercriminals are crafty – some phishing emails are nearly indistinguishable from an authentic email. So, where should you look to spot a phishing attack? The following resource provides 7 key areas to look at – check it out.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


IDC Technology Spotlight
sponsored by GoSecure
WHITE PAPER: In order to address the increasing frequency (and efficacy) of malware attacks, organizations have begun embracing managed detection and response (MDR) tools. This report provides an overview of MDR required capabilities, emerging trends and a closer look at the key features and capabilities of the GoSecure MDR Platform.
Posted: 17 Sep 2020 | Published: 31 May 2020

GoSecure

The New Business Imperative
sponsored by F5 Networks
WHITE PAPER: In a business environment where customer behavior is changing, digital transformation is accelerating, the threat of fraud is proliferating and challengers are gaining ground, organizations must change their approach to succeed. Read on to learn more about balancing user functionality and cost-effectiveness.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

F5 Networks

The Importance of Identity in Securing Your Business
sponsored by Okta
VIDEO: Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.
Posted: 17 Sep 2020 | Premiered: 17 Sep 2020

Okta

Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi Vantara
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi Vantara

2020 SANS Cyber Threat Intelligence (CTI) Survey
sponsored by ThreatQuotient
WHITE PAPER: In order to understand the risks that threaten their sensitive data, organizations are embracing cyber threat intelligence (CTI) programs. But how effective are current CTI programs? This research report provides a comprehensive look at the results of the 2020 SANS Cyber Threat Intelligence (CTI) Survey – read on to get started.
Posted: 17 Sep 2020 | Published: 29 Feb 2020

ThreatQuotient

Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

The Ultimate Balancing Act: Enabling Emerging Technologies. Ensuring Security
sponsored by Frontier Communications
RESOURCE: In order to defend against today’s fast-evolving threats, cybersecurity experts are recommending a multi-layered approach to network security that doesn’t prevent innovation. Read on to learn more about achieving this balancing act.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

Frontier Communications

Application Security with NGINX
sponsored by NGINX
WEBCAST: In today’s unpredictable security environment, organizations need to know how to implement effective security controls for their application infrastructure without impacting release velocity or application performance. In this webcast, learn how you can do just this, with specific business use cases as evidence.
Posted: 15 Sep 2020 | Premiered: Aug 5, 2020

NGINX

Update Your Disaster Collaboration Plan Now
sponsored by AVI-SPL
WHITE PAPER: Remote work capabilities were put to the test in a hurry thanks to COVID-19. If your systems were less-than-prepared to handle a sudden work-from-home environment, help is here. Read AVI-SPL's tips to upgrade your disaster collaboration plan and be better prepared for the next global event. Read the article now.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

AVI-SPL

Qorus Software Uses Hyperproof to Gain Control Over Its Compliance Program
sponsored by Hyperproof
CASE STUDY: In this case study, follow Qorus, a sales enablement and proposal management provider, as they partner with Hyperproof to address security and compliance issues and achieve flexibility that scales as the organization grows.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Hyperproof

Thales Data Protection Portfolio
sponsored by Thales
PRODUCT OVERVIEW: In this solution brief, discover an overview of Thales’ data protection portfolio – a collection of capabilities and offerings designed to enable improved security, compliance and operational efficiency while reducing costs. Read on to learn more about the features and benefits of the portfolio.
Posted: 11 Sep 2020 | Published: 29 Feb 2020

Thales

The State of Ransomware 2020
sponsored by Sophos
WHITE PAPER: Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.
Posted: 11 Sep 2020 | Published: 31 May 2020

Sophos
1 - 25 of 871 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info