Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
51 - 75 of 1008 Matches Previous Page  |  Next Page
The 2020 Trust Report: eCommerce and Retail Executive Summary
sponsored by Synack
ANALYST REPORT: This 2020 Trust Report 1-Page Executive Summary allows you to quickly benchmark your organization’s security against others in eCommerce and Retail. You’ll also learn how organizations that adopt this one testing strategy harden their assets by 23%.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Synack

Axis Security Video 1: Application Access Cloud
sponsored by Axis Security
VIDEO: Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.
Posted: 07 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Ransomware Tabletop Exercise
sponsored by CI Security
WEBCAST: Most organizations don’t have a plan to react to ransomware, and the ones that do may not have fully updated it. Be prepared for the worst – watch this webcast to see Mike Simon, CTO of CI Security, lead a 60-minute virtual tabletop exercise featuring a ransomware attack simulation and how a company responds to it.
Posted: 07 Jan 2021 | Premiered: Dec 8, 2020

CI Security

Navy Federal Credit Union on Security During Crisis
sponsored by Synack
WEBCAST: Leading an organization or a team during the COVID-19 pandemic is a challenge regardless of title. However, the CISO is uniquely armed with the skills to respond, manage and lead a team during crisis. In this podcast, hear from the CISO of Navy Federal Credit Union as he shares his methods for building trust and maintaining business as usual.
Posted: 07 Jan 2021 | Premiered: Jan 7, 2021

Synack

Secure Your Email by Moving it to O365 with Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Email-based cyberattacks are growing increasingly frequent and harder to detect. This webinar provides a closer look at 13 email threat types, the role of automation in incident response and how to improve email security by using Microsoft Office 365 and Barracuda.
Posted: 07 Jan 2021 | Premiered: 07 Jan 2021

Barracuda

Ensure your Workforce's Network is Free from Threat
sponsored by Insight
WEBCAST: Tune into this webinar to hear an industry expert talk about one leading vendor’s virtual desktop platform, including features, implementation, enhanced security and more.
Posted: 07 Jan 2021 | Premiered: Jan 7, 2021

Insight

ClearedIn for Microsoft Teams: Cloud Collaboration Security & Compliance
sponsored by Clearedin
DATA SHEET: Organizations are moving to Microsoft Teams to foster stronger collaboration, faster and more efficient communications and more meaningful connections with customers and partners. But security and compliance are two important concerns. Browse this data sheet to see how you get a powerful security and compliance layer for Teams.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Clearedin

A Fast Path Guide to Success
sponsored by Appsian
RESOURCE: For financial risk management and security leaders, protecting legacy ERP data in the age of remote work is shaping up to be a significant challenge in the new year. Read this blog post to learn more about the Appsian Security Platform and how its features are designed to identify remote security risks and protect ERP data.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

A Smarter Way for Email Security + Cloud Collaboration Compliance
sponsored by Clearedin
DATA SHEET: Today’s volatile security ecosystem has left organizations scrambling to compliantly secure their email servers. And with the cloud seeing so much use, it can be difficult to know which software will keep you out of the woods. In this solution brief, you can explore how Clearedin is helping businesses to compliantly collaborate in the cloud.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Clearedin

5 Types of Insider Threats and How to Detect Them in Your ERP System
sponsored by Appsian
RESOURCE: Although insider threats are the leading cause of the majority (57%) of data breaches, organizations often overlook these threats and focus their efforts on defending against external attacks. Read this blog post and discover the 5 most common insider threats and how to detect them in your ERP system.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

SIA Product Page
sponsored by Citrix
WHITE PAPER: From transitioning to the cloud to managing an increasingly distributed workforce, it’s more important than ever to secure users, apps and data—without compromising the employee experience. Use this white paper to discover how Citrix Secure Internet Access can help you protect all users, in any location, for all applications via the cloud.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Citrix

The Third Question: What CISOs aren’t asking - and what’s at stake.
sponsored by Absolute Software Corporation
WHITE PAPER: The role CISO is the world’s most stressful balancing act between ensuring operational efficiency and protection against sinister cyberthreats. In this white paper, 4 of the world’s top cybersecurity innovators weigh in on the critical questions CISOs need to be – but often aren’t – asking themselves.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Absolute Software Corporation

A Unified Approach to SASE that Starts with the Digital Workspace
sponsored by Citrix
WHITE PAPER: IT departments have many challenges on their hands. They need to secure users from bad actors, and enterprise data from prying eyes, while said users are working from home or in-office, and they must provide flexible access to business and personal applications wherever they are. In this article, see how a unified approach to SASE can help.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Citrix

How to Secure the Voice and Video Apps Your Workforce Depends On
sponsored by LogMeIn Rescue
WEBCAST: Given there’s no sign organizations will soon return to office-based work, IT teams must focus on providing security for voice and video applications. In this webinar, explore the most common threats, such as VoIP and video attacks, and learn how security teams can best counter them through effective prevention, detection and mitigation strategies.
Posted: 05 Jan 2021 | Premiered: Jan 5, 2021

LogMeIn Rescue

Case Study: Ledn
sponsored by Clearedin
CASE STUDY: In this case study, discover how Ledn, a cryptocurrency company, was able to achieve better email security and industry-specific compliance requirements through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

Evonik Industries Success Story
sponsored by SNP Transformation
CASE STUDY: For Evonik, a global chemicals company, balancing a growing list of compliance mandates with data protection and employee productivity is a difficult task. Read this case study to see why they partnered with SNP to address these challenges and discover the outcomes of this initiative.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

SNP Transformation

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company's reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization's preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 05 Jan 2021 | Published: 20 Jul 2020

Mimecast

Transforming the SOC
sponsored by Mimecast
WHITE PAPER: Each year, organizations explore new technological territories and hackers grow more complex. This is made more difficult by an ever-expanding cybersecurity skills gap. This resource captures the expertise of independent industry leaders dedicated to addressing this imbalance by helping organizations rethink security operations – download now.
Posted: 05 Jan 2021 | Published: 16 Jul 2020

Mimecast

Citrix offers a fully unified, ready-to-deploy SASE solution
sponsored by Citrix
RESOURCE: Your business has new requirements to meet today’s challenges. Legacy, hardware-based networking and security architectures fail to meet the needs of remote workers, manage the shift to the cloud and protect against zero-day threats. It’s time for a change – download this infographic to learn about SASE from Citrix.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Citrix

Secure Internet Access: Comprehensive, Cloud-delivered Security for the Digital Workspace
sponsored by Citrix
WHITE PAPER: Increases in both hybrid cloud adoption and remote work mean that traditional connectivity models such as VPN and MPLS no longer provide ample performance and security. Enter Citrix Secure Internet Access, a SASE framework offering comprehensive security and reliable access to apps from any device. Download this solution brief for more details.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Citrix

Case Study: Lee Company
sponsored by Clearedin
CASE STUDY: In this case study, discover how Lee Company, a construction and building services firm, was able to improve their email, cloud and collaboration security capabilities through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Securing Your Remote Workforce with Okta and Palo Alto Networks
sponsored by Palo Alto Networks
WEBCAST: We are in the new normal – organizations are having to deal with more cyberthreats than ever before, and security is changing as a result. Join industry experts in this webinar as they discuss the specific security challenges facing organizations with distributed or remote workforces and how they can address them with a zero-trust model.
Posted: 04 Jan 2021 | Premiered: Jan 4, 2021

Palo Alto Networks

Understanding Secure Access Service Edge (SASE) Architectures
sponsored by Citrix
WHITE PAPER: Increased usage of cloud apps and services, a spike in remote work and evolving security threats are all calling SASE to action. This cloud-based networking & security architecture is changing the game for organizations of all sizes in the cloud and mobile-first era. Dive into this white paper to understand how these services work.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Citrix

ClearedIn for Slack
sponsored by Clearedin
PRODUCT OVERVIEW: The shift towards remote work has led to a rise in the use of cloud collaboration tools, like Slack. This solution brief highlights how ClearedIn can enhance security and compliance capabilities to keep your Slack users safe and productive – read on to get started.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Innovation Insight For Extended Detection And Response
sponsored by Palo Alto Cortex
RESEARCH CONTENT: Disparate risk management teams and security tools make it difficult to efficiently mitigate threats. This Gartner report highlights the risks and advantages of today’s leading extended detect and response (XDR) tools – designed to unify incident detection and response efforts into a single platform.
Posted: 04 Jan 2021 | Published: 19 Mar 2020

Palo Alto Cortex
51 - 75 of 1008 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info