Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 631 Matches Previous Page  |  Next Page
Executive Brief: Why Secure Mobile Access Is A Strategic Business Imperative
sponsored by SonicWall
WHITE PAPER: According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.
Posted: 29 May 2020 | Published: 29 May 2020

SonicWall

Rethinking Data Protection: The Human-centric Approach
sponsored by Forcepoint
WHITE PAPER: While mobile devices and cloud applications enable organizations to enhance productivity, scalability and cost-savings, these modern environments come with new security risks. Download this e-book to learn more about the current and expected challenges and discover the benefits of a people-centric approach to cybersecurity.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

Cloud Security: A Buyer’s Guide
sponsored by Forcepoint
WHITE PAPER: Given the amount of critical data being hosted in the cloud, it should come as no surprise that organizations are taking careful steps to safeguard their sensitive information. In this buyer’s guide, explore evaluation criteria and a competitive analysis designed to equip you with the knowledge to find the right cloud security provider for you.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

DaaS Proactive Security Management
sponsored by Hewlett Packard Enterprise
RESOURCE: Managing the security of each user device is complicated, especially at large organizations with a mix of operating systems and device types. In this blog post, take a closer look at HP’s Proactive Security Management suite, designed to help organizations monitor their endpoints and proactively address and mitigate security issues.
Posted: 29 May 2020 | Published: 29 May 2020

Hewlett Packard Enterprise

How Okta and Netskope Delivered on BMC's Cloud Security Strategy
sponsored by Okta + Netspoke
CASE STUDY: In this blog post, Joel Bruesch, Sr. Director of Cybersecurity at BMC Software, overviews key security challenges he’s seen in his leadership role and highlights how BMC partnered with Okta and Netskope to build an identity-first cloud security.
Posted: 29 May 2020 | Published: 21 Jun 2019

Okta + Netspoke

Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric

Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs
sponsored by Dell SecureWorks
WEBCAST: The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.
Posted: 28 May 2020 | Premiered: May 28, 2020

Dell SecureWorks

Securing Your Wherever, Whenever Workforce
sponsored by Forcepoint
EBOOK: Mobile devices and cloud-based applications enable teams to work remotely and improve productivity, agility, and innovation. However, as these environments grow so too do the security challenges. In this e-book, explore today’s security risks and discover how to secure and support today’s remote workforce, along with their devices.
Posted: 28 May 2020 | Published: 28 May 2020

Forcepoint

Top 10 Security Events to Monitor in Azure Ad and Microsoft 365
sponsored by Quest
WHITE PAPER: Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.
Posted: 28 May 2020 | Published: 28 May 2020

Quest

DAST vs SAST: A Case for Dynamic Application Security Testing
sponsored by Acunetix
RESOURCE: When it comes to performing a security test for business applications, most security teams have a preference: DAST or SAST. However, both play a key role in effective security testing strategies. Read this article to learn more about the strengths of implementing the DAST method, and how to address its weaknesses.
Posted: 28 May 2020 | Published: 06 Mar 2020

Acunetix

Comprehensive Data Security and Access Control in Today’s Multi-Cloud World
sponsored by Okta + Netspoke
RESOURCE: Organizations are moving to the cloud, enhancing productivity but bringing about new security challenges. As environment grow more complex, organizations need to to find a way to provide secure cloud access for users. Continue reading to learn more about data security and access control in the era of multi-cloud environments.
Posted: 28 May 2020 | Published: 28 May 2020

Okta + Netspoke

COVID-19: Keeping Your Vulnerability Management Program on Track
sponsored by Vulcan
RESOURCE: As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.
Posted: 28 May 2020 | Published: 26 Mar 2020

Vulcan

OWASP Top 10: The Most Critical Risks Facing Web Applications
sponsored by F5 Networks
WEBCAST: Today’s organization uses an average of 983 different applications. As such, ensuring the protection of these web applications is critical for avoiding disruptive breaches and maintaining operational efficiency. In this webinar, explore the top 10 most critical risks facing today’s web applications and the steps you can take to mitigate them.
Posted: 28 May 2020 | Premiered: May 28, 2020

F5 Networks

The Future Is the Web! How to Keep It Secure?
sponsored by Acunetix
WHITE PAPER: As organizations and their environments grow increasingly complex, so too do the threats that they face. Web security has never been more critical, and cybersecurity skills gap has never been greater – so how can organizations keep their environments secure? Download this white paper to find out.
Posted: 27 May 2020 | Published: 27 May 2020

Acunetix

Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

IT Ops & Security need to join forces
sponsored by Matrix42
WHITE PAPER: In this white paper, take a closer look at the security challenges for security leaders, the burden of GDPR, and discover a checklist for developing an effective security strategy that automates and integrates workspace management with data loss prevention, threat prevention, data encryption, post-infection protection and compliance.
Posted: 27 May 2020 | Published: 27 May 2020

Matrix42

Data Security with Okta and Netskope
sponsored by Okta + Netspoke
RESOURCE: As organizations continue to embrace the productivity and cost benefits of cloud capabilities, it’s now more important than ever the make sure the right security checks are in place to secure sensitive data. Read this blog post to discover the common points of failure, explore what a CASB is (and how it can help), and more.
Posted: 27 May 2020 | Published: 18 Jul 2018

Okta + Netspoke

All Good Remediation Strategies Begin with Collaboration
sponsored by Vulcan
RESOURCE: As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.
Posted: 27 May 2020 | Published: 06 Apr 2020

Vulcan

Secure Modern Applications with Diamanti
sponsored by Diamanti
RESOURCE: Ensuring the security of business applications is a fundamental aspect of being a security leader. Volume encryption and SEDs provide excellent ways to secure application data, but which one should you choose? Read this article to learn more about the Diamanti platform, which comes with both measures already built-in.
Posted: 27 May 2020 | Published: 05 May 2020

Diamanti

Hack the Pentagon Case Study
sponsored by Synack
CASE STUDY: The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.
Posted: 26 May 2020 | Published: 31 Oct 2018

Synack

Get Off the Ice Before it Breaks
sponsored by Matrix42
PRODUCT OVERVIEW: Each year, cyberattacks grow in both volume and success, leading to costly breaches. In fact, 7 in 10 industrial organizations fell victim to a cyberattack over the last 2 years. In this solution brief, learn how Matrix42’s GDPR-compliant data protection offering can help your organization meet its security goals.
Posted: 26 May 2020 | Published: 26 May 2020

Matrix42

USM Case Study
sponsored by Matrix42
CASE STUDY: In this case study, follow the journey of USM, an international furniture system manufacturer, as they partner with Matrix42 to integrate a client management tool designed to unify and manage their growing number of endpoints. Read on to unlock the results.
Posted: 26 May 2020 | Published: 26 May 2020

Matrix42

How to Improve Your Enterprise VPN Security
sponsored by Vulcan
RESOURCE: The use of VPNs as a means to secure remote workers is nothing new. However, as social distancing and working from home become the new norm, organizations grow increasingly reliant on VPNs to maintain productivity and security. Read this article to discover 3 known VPN vulnerabilities and the steps you can take to remediate them.
Posted: 26 May 2020 | Published: 08 Apr 2020

Vulcan

Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST: As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020

Trend Micro
1 - 25 of 631 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info