IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
1 - 25 of 1118 Matches Previous Page  |  Next Page
Reece Group Protects Endpoints and Automates Threat Management
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

BlackBerry

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

Avoiding Data Leaks with Scalable Encryption and Access Controls
sponsored by Thales
PRODUCT OVERVIEW: Most organizations are using Amazon S3 to store their sensitive data. While the storage is simple to deploy, it’s proven to be difficult to secure for some organizations. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 are safe and comply with the strictest security regulations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Thales

Brother Secures Access and Reduces Costs with Cloud-based Authentication
sponsored by Thales
CASE STUDY: In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Thales

Secure Access to Virtual Environments and Private Clouds
sponsored by Thales
PRODUCT OVERVIEW: As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.
Posted: 13 Jul 2020 | Published: 30 Jun 2020

Thales

The Changing Face of Data Security: 2020 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.
Posted: 13 Jul 2020 | Published: 31 Mar 2020

Thales

The Forrester Wave™: Governance, Risk, And Compliance Platforms, Q1 2020
sponsored by ServiceNow
WHITE PAPER: In this most recent edition of The Forrester Waver, Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

ServiceNow

DataVisor Scales Multicloud Security & Compliance for Customers
sponsored by Lacework
CASE STUDY: In this case study, discover how DataVisor, a rapidly growing organization that offers AI-based fraud detection and risk management, was able to ensure security, productivity and compliance across their expanding multicloud environment.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Lacework

The Business of Data Security: 4 Often Overlooked Security Considerations for SMBs
sponsored by Citrix
EBOOK: As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

Continuous Authentication as the Zero Trust Multiplier
sponsored by BlackBerry
RESOURCE: The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.
Posted: 10 Jul 2020 | Published: 14 May 2020

BlackBerry

Using Secure Email Gateway to enhance data security in Microsoft Office 365
sponsored by Clearswift
PRODUCT OVERVIEW: This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Clearswift

Protect Your Network: Best Practices, Incidents & Other Security Considerations
sponsored by Zones, Inc.
EGUIDE: Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.
Posted: 10 Jul 2020 | Published: 07 Jul 2020

Zones, Inc.

Itergy & Quest Live Webinar: IT Threats & Risks of the New Normal
sponsored by Itergy
VIDEO: After the initial changes in March, organizations are now adjusting to the ‘new normal’ – with nearly 100% of the workforce operating remotely. Organizations are now evaluating their current setup and ability to handle future changes. Watch this webinar to leverage the expertise of 2 industry leaders as they discuss these issues.
Posted: 10 Jul 2020 | Premiered: 16 Jun 2020

Itergy

10 Best Practices for Internet Security
sponsored by Verizon
RESOURCE: Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

2020 Data Breach Executive Brief
sponsored by Verizon
WHITE PAPER: Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Download this executive brief to unlock this year’s findings.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

Workload Security: Visibility and Analysis for Cloud and Container Workloads
sponsored by Lacework
PRODUCT OVERVIEW: The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Lacework

Okta Digital Trans Insurance
sponsored by Okta
WEBCAST: Embracing the digital transformation seems to be a growing trend across every industry, and the insurance industry is no exception. In this Okta webinar, join 2 distinguished security leaders as they discuss the challenges and opportunities for digital transformation in the insurance industry.
Posted: 09 Jul 2020 | Premiered: Jul 9, 2020

Okta

Six-Step Guide to Email Security Best Practices
sponsored by Clearswift
WHITE PAPER: The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Clearswift

Controlling Classified Information
sponsored by Clearswift
PRODUCT OVERVIEW: Besides compliance requirements, data loss prevention (DLP) strategies are critical for maintaining good cybersecurity hygiene as well as avoiding financial or reputational damage. To learn more about Clearswift’s flexible and simple DLP offering, download this solution brief.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Clearswift

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Where Law and Tech Will Collide in 2020
sponsored by RSA Conference
WEBCAST: The acceleration of “tech disruption” across all industries is exacerbating privacy risks to consumers globally. NIST has released draft privacy controls, providing guidance for companies to manage privacy risks. Watch this RSA Conference webinar to see industry experts discuss where technology and the law might find friction in 2020.
Posted: 09 Jul 2020 | Premiered: Jan 7, 2020

RSA Conference

Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.
sponsored by Lacework
CASE STUDY: In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

Unlock the Value of Your AWS CloudTrail Data
sponsored by Lacework
PRODUCT OVERVIEW: As business environments become increasingly complex, threat detection becomes a daunting task. To help overburdened security analysts, Lacework designed a platform to detect anomalies and potential threats within your network, providing you with contextual behavioral analytics. Download this solution brief to learn more about the platform.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

Royal Holloway: Driverless vehicle security for military applications
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 09 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
WEBCAST: While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Okta
1 - 25 of 1118 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info