Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 507 Matches Previous Page  |  Next Page
A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: There are 6 scenarios where you and your customers are prone to fraud. In this white paper, discover these common scenarios and learn how a fraud detection platform can identify risks within your organization.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Splunk

Testing Endpoint Security: An Introductory Guide
sponsored by Sophos
WHITE PAPER: In this 25-page white paper, explore how to successfully test endpoint security software. Find out how testing a wide range of features in multiple scenarios is the best way to have clarity on how effective an endpoint security product can be against the advances that attackers have made in recent years.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Sophos

1984 to 2018: The Evolution of the Olympics
sponsored by Radware
RESOURCE: Click inside to learn how the IoT revolution impacted the 2018 PyeongChang Olympic games, as well as the challenges providers and the future host cities of the games will have to address when it comes to protecting internet connected devices and users.
Posted: 08 Mar 2018 | Published: 21 Feb 2018

Radware

Responding Efficiently to Major Data Breaches
sponsored by Nuix
WHITE PAPER: In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Nuix

How to Secure Your Network from Ransomware
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the trends in ransomware, from what attackers are hoping to gain, to what it costs victims. Click inside to learn about a new approach to defending against this malware through cloud-based threat analysis.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Palo Alto Networks

CW Nordics ezine February 2018
sponsored by ComputerWeekly.com
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 19 Feb 2018 | Published: 22 Feb 2018

ComputerWeekly.com

6 Steps to Build a Holistic Security Strategy with Microsoft 365
sponsored by Microsoft
EBOOK: This e-book outlines how you can take advantage of the security tools built into Microsoft 365 to build a holistic security strategy in 6 steps.
Posted: 14 Feb 2018 | Published: 30 Nov 2017

Microsoft

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

The Rebirth of Endpoint Protection
sponsored by NSS Labs
WHITE PAPER: Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs

Fighting Fraud with Unified Data
sponsored by Adyen
WHITE PAPER: Explore how unified commerce can give retailers a metric to detect potential fraud and note transactions that do not fit a customer's established pattern.
Posted: 07 Feb 2018 | Published: 30 Nov 2017


Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015

Axiomatics

Modern IAM: Build Trust Without Sacrificing Security
sponsored by CA Technologies
WHITE PAPER: This white paper outlines how a modern identity and access management system can help build trust between yourself and your users without infringing on their freedom.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

CA Technologies

Unified Threat Management (UTM) Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: Click inside to learn the 4 aspects that any good unified threat management (UTM) system has, as well as a buyer's checklist to make sure you have everything you need.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Fortinet, Inc.

CW Benelux February 2018
sponsored by ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

ComputerWeekly.com

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 23 Jan 2018 | Published: 03 Aug 2017

Splunk

Getting the Board on Board with Application Security
sponsored by WhiteHat Security
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

CW Europe – December 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 07 Dec 2017 | Published: 14 Dec 2017

ComputerWeekly.com

The Tug of War Between UBA and SIEM
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

Next-Generation Firewalls: The Cornerstone of Future Security
sponsored by Palo Alto Networks
WHITE PAPER: Learn about one next-gen firewall that combines network, cloud and endpoint security capabilities, and enables them all with threat intelligence to help prevent cyber breaches. Read on to find 6 key abilities of this strategy.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Palo Alto Networks

The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

The Australian Privacy Amendment Explored
sponsored by Rapid7
DATA SHEET: Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Rapid7
1 - 25 of 507 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement