Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 326 Matches Previous Page  |  Next Page
Top 10 Reasons Customers Choose Proofpoint to Protect Office365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Transparent Data Movement Solution Overview
sponsored by RackTop Systems
DATA SHEET: Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

CyberConverged Data Storage
sponsored by RackTop Systems
DATA SHEET: Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage Designed for the Creative Process
sponsored by RackTop Systems
DATA SHEET: Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage: An Overview
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Getting a Handle on Data Exposure
sponsored by RackTop Systems
DATA SHEET: The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

SD-WAN with Enterprise Scale and Security in Action
sponsored by Forcepoint
WEBCAST: Find out how you can manage your network and boost connectivity no matter how spread out your enterprise is with a scalable SD-WAN platform, combined with the industry's top-rated next-gen firewall—all managed at enterprise scale from a single policy-based console.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

2019 Webroot Threat Report
sponsored by Webroot
ANALYST REPORT: In this 2019 Webroot Threat Report, it details the threat activity throughout 2018, and compares the data with that from years past. Tap into the report to get insights on how you can combat cybercrime today and in the future.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Webroot

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs
sponsored by SkOUT
CASE STUDY: To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

SkOUT

C-Suite Perspectives: From Defense to Offense - Executives Turn Information Security Into a Competitive Advantage
sponsored by Radware
ANALYST REPORT: In this 2019 Executive Application & Network Security Report, discover the current leading cybersecurity challenges and opportunities for C-suite-level executives.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Radware

How to Prevent Data Breaches
sponsored by SkOUT
WHITE PAPER: How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

SkOUT

What is Phishing?
sponsored by SkOUT
WHITE PAPER: Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

Managed Detection and Response
sponsored by Rapid7
PRODUCT OVERVIEW: Rapid7's Managed Detection and Response (MDR) service offers a combination of expertise and technology to detect dynamic threats quickly across your entire ecosystem. In this service overview, learn more about Rapid7's MDR service and 5 key advantages the service offers.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Rapid7

Anybody Home? Vulnerability Scans vs. Penetration Tests
sponsored by SkOUT
WHITE PAPER: This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

The Impact of Cyber-Based Financial Fraud
sponsored by SkOUT
WHITE PAPER: Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

How Spear Phishing Targets the C-Suite
sponsored by Inky Technology
RESOURCE: In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Security and Governance for Amazon S3 Data Lakes
sponsored by Okera
WHITE PAPER: In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.
Posted: 24 Jun 2019 | Published: 31 Mar 2019

Okera

Quarterly Threat Report
sponsored by Proofpoint
ANALYST REPORT: Learn about the most recent threats in 2019 and how to root them out in email messages, social media posts, and malware samples.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Proofpoint

Cutting Bait: How to Identify, Avoid, and Protect Against Phishing
sponsored by SkOUT
WHITE PAPER: How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

SkOUT

Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime
sponsored by Unitrends
WHITE PAPER: This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.
Posted: 01 May 2019 | Published: 01 May 2019

Unitrends

Infographic: 2019 Europe IT Priorities - Security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Business Case for Web Isolation
sponsored by Menlo Security
WHITE PAPER: As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

Isolation: A Part of the Modern Security Architecture
sponsored by Menlo Security
WHITE PAPER: Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security
1 - 25 of 326 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement