Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
51 - 75 of 656 Matches Previous Page  |  Next Page
Aflac Enhances Cyber Threat Intelligence and Integrates Security Ecosystem with Infoblox
sponsored by Infoblox
CASE STUDY: In this case study, discover how Aflac, a major insurance provider in the US, was able to tackle a massive transformation across 3 fronts: cloud, threat intelligence, and cybersecurity. Read on to see why they chose Infoblox as their trusted strategic partner and discover the results of Aflac’s 3 major projects.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Infoblox

High-Velocity Cloud Security At Scale
sponsored by BreakFree Solutions
WHITE PAPER: The key to realizing the full benefits of a cloud migration lies in striking a balance between transformative cloud capabilities and effective cloud security. Read this insight report to learn about BreakFree’s cloud security framework and discover how to implement it with JupiterOne.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BreakFree Solutions

The Guide To Just-In-Time Privileged Access Management
sponsored by BeyondTrust Corporation
EGUIDE: Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BeyondTrust Corporation

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
PRESENTATION: Today’s cyberthreats are becoming increasingly troublesome, and traditional security efforts often lack the unified vision and visibility required to tackle these challenges. Read this presentation for a closer look at today’s advanced threats and discover how Endpoint detection and response (EDR) tools are uniquely positioned to address them.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Bitdefender

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

Market Guide for Insider Risk Management Solutions
sponsored by Proofpoint
RESEARCH CONTENT: Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Use this Gartner Market Guide to understand and implement insider risk mitigation.
Posted: 11 Feb 2021 | Published: 29 Dec 2020

Proofpoint

Advanced Threat Detection, Focused Investigation And Effective Response
sponsored by Bitdefender
DATA SHEET: Traditional endpoint security efforts are growing less and less capable of preventing today’s sophisticated cyberthreats – increasing the need for advanced threat detection, investigated and response capabilities, typically in the form of Endpoint Detection and Response (EDR). Read this datasheet to see what Bitdefender offers in terms of EDR.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

Bitdefender

The Total Economic Impact™ Of ServiceNow Risk And Compliance
sponsored by ServiceNow
RESEARCH CONTENT: Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.
Posted: 10 Feb 2021 | Published: 31 Jan 2021

ServiceNow

Case Study: Archdiocese
sponsored by Bitdefender
CASE STUDY: The Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Bitdefender

Bitdefender Managed Detection & Response Service
sponsored by Bitdefender
DATA SHEET: Today’s cyberthreats are growing in their volume and sophistication, and security teams are facing increased pressure to address these threats while their resources to do so diminish – so what can be done to remedy this? Read this datasheet to learn more about the benefits of MDR and discover the key features of Bitdefender’s MDR offering.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Bitdefender

Preventing unwanted sensitive data acquisition on the corporate network
sponsored by HelpSystems
EGUIDE: Insider threats are quickly becoming one of the most prominent risk areas for an organization. In fact, the average cost of an insider threat for organizations in 2020 was estimated at $2.79 million. But where are these insider threats coming from and how can an organization be equipped to handle them? Read this e-guide to find out.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

HelpSystems

Are You Ready For Managed Detection and Response?
sponsored by Bitdefender
PRODUCT OVERVIEW: Managed Detection and Response (MDR) tools have emerged to ease the burden of high volumes of cyberthreats on security teams. But what exactly is MDR, what key gaps does it address, and how does it improve security? Read on to find out
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Bitdefender

Breaking Down Video Conferencing Privacy And Security
sponsored by Pexip
PODCAST: More people are on video than ever before, but this huge increase has also brought increased security concerns. ‘Zoombombing’ and other video conferencing breaches are in the headlines, and enterprises are being called to ensure privacy and security for all users. Jump into this podcast to hear a breakdown of the subject in detail.
Posted: 08 Feb 2021 | Premiered: May 7, 2020

Pexip

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

Hacker's Path To The Crown Jewels
sponsored by Cymulate
EBOOK: Hacking campaigns typically follow a predictable pattern involving 4 main activities: Recon, initial foothold, lateral movement, and data exfiltration. Download this e-book to learn more about this 4-step hacking pattern and discover how organizations can better detect the early warning signs of an impending hack.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Cymulate

The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020

Bitdefender

Four Cybersecurity Essentials That Your Board Of Directors Wants To Know
sponsored by Cymulate
EGUIDE: For security leaders, one of the most daunting tasks is explaining your organization’s cybersecurity strategy and needs to a nontechnical audience – especially when that audiences consists of executives and the board of directors. Read this e-guide to learn about which key metrics to highlight and how to make your case to a room of execs.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Cymulate

Protecting Healthcare Data with Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: To better manage and protect patient data, healthcare organizations are embracing encryption capabilities. In this use case, explore the common pain points and challenges that have led to the rise of encryption and discover the potential business benefits of adopting a Removable Media Container Encryption (RMCE).
Posted: 01 Feb 2021 | Published: 01 Feb 2021

WinMagic

Database and Big Data Security
sponsored by Comforte AG
RESEARCH CONTENT: This report provides an overview of database and big data security market along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. Read this 75-page report to enhance your understanding of the market and discover how to find a solution best-fit to your needs.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Comforte AG

Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO: Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021

Thales

SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material
sponsored by Thales
CASE STUDY: As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Thales

Transforming risk Why digital transformation depends on integrated risk management
sponsored by ServiceNow
EBOOK: Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

ServiceNow

Future Of The Soc Soc People: Skills Not Tiers
sponsored by Chronicle
WHITE PAPER: We’ve entered a new phase of the digital revolution. Network edges are extended to a point of entanglement with the physical world, expanding hybrid cloud and an increasingly multi-cloud core—all of which necessitates a rethinking of the SOC workforce model. Access this white paper to see the prospective focus on SOC talent.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Chronicle

2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT: Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

DomainTools

Understand the OWASP Top 10 & How WAFs Can Mitigate Them
sponsored by Radware
EBOOK: Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Radware
51 - 75 of 656 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences