Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Security Spending

RSS Feed   
Security Spending Reports
1 - 25 of 196 Matches Previous Page  |  Next Page
Product Overview
sponsored by Armorblox
PRODUCT OVERVIEW: In this product overview, take a closer look at the capabilities and features of Armorblox: A cloud-native email security platform that addresses the inbound and outbound security threats plaguing today’s email platforms. Read on to learn more.
Posted: 20 Feb 2020 | Published: 05 Feb 2020

Armorblox

Privileged Access Credential Management for Loosely Connected Devices
sponsored by Cyber-Ark Software
DATA SHEET: The rise of privileged access and mobile endpoints has enabled organizations to improve their business operations. However, these accounts are vulnerable to attacks, requiring deliberate security planning. Download this data sheet to take a closer look at the features and benefits of the CyberArk Privileged Access Security Solution.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Cyber-Ark Software

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Case Study: Quanta Services
sponsored by Chronicle
CASE STUDY: In this case study, join James Stinson, VP of IT at Quanta Services, a skilled workforce contractor in North America, as he highlights the company’s journey towards cybersecurity and their partnership with Chronicle to establish a security analytics platform.
Posted: 10 Feb 2020 | Published: 31 Oct 2019

Chronicle

L.A. Tourism and Convention Board
sponsored by Absolute Software Corporation
CASE STUDY: As a non-profit organization, LA Tourism’s IT team is under tremendous pressure to ensure security while remaining efficient with limited resources. Download this case study and follow LA Tourism’s journey as they partner with Absolute to establish a security strategy that improved compliance and network visibility.
Posted: 07 Feb 2020 | Published: 06 May 2019

Absolute Software Corporation

Complexity in Cybersecurity Report 2019
sponsored by IBM
WHITE PAPER: The evolving nature of security has led organizations to adopting a wide array of disjointed security tools. This overly siloed environment leads to complexity, which ultimately affects overall security efficacy. In this report, uncover results from a Forrester study into the current state of security complexity & the effect it’s having.
Posted: 04 Feb 2020 | Published: 31 May 2019

IBM

How to Build Out Your Cybersecurity Technology Stack
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: For organizations beginning their journey towards establishing a cybersecurity program, there can be an overwhelming number of vendors to choose from. This white paper is designed to guide organizations as they begin their selection process by providing advice for what to look for when evaluating vendors and service providers.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.

Why Your Company Needs Third-Party Solutions for Office 365
sponsored by Egress Software Technologies Inc
WHITE PAPER: Organizations are increasingly turning to Microsoft Office 365 as their preferred collaboration platform. While its convenience is hard to beat, security settings may not be meeting your needs. In this report, discover how your company can achieve security in Office 365 that meets compliance requirements.
Posted: 31 Jan 2020 | Published: 31 Jan 2019

Egress Software Technologies Inc

How to Build a Winning Cybersecurity Team
sponsored by Global Knowledge
WHITE PAPER: Just like a sports team, cybersecurity teams need to be carefully built and managed in order to reach peak performance. Effective cybersecurity teams also require adequate processes and technologies to support their efforts. So, what should you consider when building a winning cybersecurity team? Read on to find out.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Global Knowledge

Building supply company boosts endpoint security with Malwarebytes
sponsored by Malwarebytes
CASE STUDY: In this case study, a large US building supply company implemented Malwarebytes’ Endpoint Protection and Response services to establish endpoint resiliency and reduce their remediation time from several days down to minutes or hours.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

Malwarebytes

Machine Learning Applications for Banking Fraud Detection
sponsored by Dataiku
EGUIDE: AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

A guide to SIEM platforms, benefits and features
sponsored by SearchSecurity.com
EZINE: SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

SearchSecurity.com

A Buyer’s Guide to Privacy-Centric Data Discovery
sponsored by BigID
WHITE PAPER: Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

Easy Ways to Dominate the Securities-as-a-Service Game
sponsored by RapidFire
WHITE PAPER: Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

Channel Security Experts Deep Dive: The Anatomy of an MSP Breach
sponsored by Datto, Inc.
WEBCAST: In the following webinar, Channel security experts dig further into the anatomy of MSP breaches. Tune in to join the discussion on the state of cybersecurity in the IT channel, low to zero cost tactics that improve MSP cyber defenses, and more.
Posted: 16 Oct 2019 | Premiered: Oct 16, 2019

Datto, Inc.

Securing Office 365 Against Data Loss and Advanced Threats
sponsored by Datto, Inc.
WEBCAST: Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.
Posted: 15 Oct 2019 | Premiered: Oct 15, 2019

Datto, Inc.

The Business Guide to Ransomware
sponsored by Datto, Inc.
EBOOK: Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

Datto, Inc.

Ransomware Made MSPeasy: The MSP’s Guide to Saving the Day
sponsored by Datto, Inc.
EBOOK: Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
EBOOK: The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

RMM & Patch Management: The First Line of Defense Against Cyber Threats
sponsored by Datto, Inc.
WHITE PAPER: Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Barracuda
1 - 25 of 196 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info