IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
1 - 25 of 1279 Matches Previous Page  |  Next Page
Leverage the SOC Visibility Triad to Automate Attacker Detection & Response
sponsored by Vectra AI
VIDEO: In order to help organizations coordinate security efforts and improve threat response, Gartner came up with the SOC Visibility Triad model, which consists of 3 key capabilities – NDR, EDR & SIEM/UEBA. The following webinar discusses how to best leverage the SOC Visibility Triad to improve security performance – watch now.
Posted: 26 Oct 2020 | Premiered: 26 Oct 2020

Vectra AI

The Trusted Data Center and Server Infrastructure: Mid-Market Organizations
sponsored by Dell Technologies Partner Program
EBOOK: For highly competitive mid-market organizations, a data center outage can have devastating effects on the company’s reputation, legal standing and bottom line. This eBook provides best practices and strategic insights that mid-market IT leaders can use to improve the security and reliability of their IT environments.
Posted: 26 Oct 2020 | Published: 30 Nov 2019

Dell Technologies Partner Program

Top 10 Reasons for Migrating to CipherTrust Manager for KeySecure Customers
sponsored by Thales
WHITE PAPER: For years, the KeySecure platform has equipped organizations with key management and data protection capabilities across their organizations. The following white paper highlights 10 reasons why KeySecure users should switch over to Thales’s next-gen CipherTrust manager – read on to learn more.
Posted: 26 Oct 2020 | Published: 30 Jun 2020

Thales

CipherTrust Data Security Platform
sponsored by Thales
DATA SHEET: Security pros tasked with ensuring data protection are facing challenges on 3 fronts: looming cyberthreats, growing compliance requirements, and expanding environments. Read this data sheet for a closer look at the key features and capabilities of Thales’ CipherTrust Data Security Platform – which looks to alleviate these pain points.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Thales

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Intelligent Security Solutions for Your Business
sponsored by Konica Minolta
WHITE PAPER: Many organizations don’t have the resources to keep a constant eye on their infrastructure to look out for potential weaknesses or threats. As such, they need to reevaluate their postures to secure the know-how to perpetually monitor their situation. Read this white paper to learn how make your security more intelligent.
Posted: 23 Oct 2020 | Published: 23 Oct 2020


The Total Economic Impact of Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.
Posted: 23 Oct 2020 | Published: 31 Aug 2020

Armor

Is Threat Intelligence the Go-To Weapon for Fighting Advanced Threats?
sponsored by Bitdefender
RESOURCE: The threat intelligence platform (TIP) market is emerging as the go-to weapon against the onslaught of today’s advanced cyberthreats – but what is it about TIPs that make them so effective against these threats? Read this article to find out.
Posted: 23 Oct 2020 | Published: 21 Oct 2020

Bitdefender

How Secureworks Offers a Holistic Approach to Security
sponsored by Dell SecureWorks
WHITE PAPER: In today’s increasingly dangerous threat landscape, only a unified, integrated approach to security can help your organization address these challenges. This white paper talks about how SecureWorks leverages artificial intelligence and machine learning to help organizations build a holistic cybersecurity approach – read on to learn more.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Dell SecureWorks

How to Improve ROI and Operational Efficiency for Cybersecurity
sponsored by Vectra AI
PRODUCT OVERVIEW: The effects of the cybersecurity skills gap are most prominent when it comes to threat detection and response – teams are overworked by the sheer volume of alerts, not to mention the effort it takes to flag and isolate threats before it’s too late. Read this white paper for an overview of Vectra’s AI offering, which aims to remedy this gap.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

The 2020 Spotlight Report on Office 365
sponsored by Vectra AI
WHITE PAPER: Account takeovers are responsible for upwards of $7 billion in annual losses across multiple industries, according to Forrester. The following Spotlight Report from Vectra provides a comprehensive analysis of the cyberthreats targeting Office 365 users, and why some of these attacks are succeeding – read on to learn more.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

Security for Modern Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

The New Economy
sponsored by Armor
WHITE PAPER: In this year’s Dark Market Report, Armor’s security team takes a closer look into the activities occurring in underground cybercrime communities, such as emerging threats, hacker price lists, trending attack vectors, and more – read on to explore the complete findings from the Armor security team.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

Armor

Emergency Preparedness: Was Your Company Ready for COVID-19?
sponsored by VMware International Unlimited Company
WHITE PAPER: Emergency preparedness is tricky – it’s nearly impossible to plan for every emergency or incident. This research report from Osterman Research provides an in-depth analysis of emergency preparedness plans pre-COVID-19 and offers best practices for improving incident readiness going forward.
Posted: 22 Oct 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

The Future of Remote Work: Securing A Distributed Workforce
sponsored by VMware International Unlimited Company
RESOURCE: Nearly all non-essential employees have been working remotely since March, a trend that is likely to continue for the foreseeable future. To help organizations acclimate, VMware offers their Carbon Black Cloud tool, which looks to consolidate and unify security efforts across all control points – read on to explore the key features.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware International Unlimited Company

On-Demand Webinar: The Importance of Cloud Governance
sponsored by Concourse Labs
WEBCAST: Automated cloud governance is emerging as one of the most effective ways organizations can ensure security and compliance at scale as they migrate towards cloud environments. Watch this webinar to learn more about the importance of cloud governance, its role in digital transformation, and more.
Posted: 21 Oct 2020 | Premiered: Oct 21, 2020

Concourse Labs

The Six Steps to Effective Cloud Governance
sponsored by Concourse Labs
WHITE PAPER: Without effective cloud governance, cloud migrations would present disastrous security risks – threatening an organizations financial health, regulatory compliance and reputation. This eBook provides 6 regimented steps to help organization achieve effective cloud governance.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Prevent Fraud and Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organizations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of Mimecast’s email authentication offering.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Automated Cloud Governance: The ONUG Collaborative
sponsored by Concourse Labs
WHITE PAPER: As organizations continue to embrace cloud capabilities, ensuring security and governance across these new environments becomes more important than ever. This e-guide provides a comprehensive overview of the most effective way to achieve automated cloud governance (compliance & security at the speed of DevOps) – read on to get started.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

A Buyers’ Guide to SecOps
sponsored by VMware International Unlimited Company
EGUIDE: Endpoint detection and response (EDR) tools are emerging as a prominent figure in protecting an organization’s endpoints. Similarly, SecOps tools are quickly becoming critical in ensuring security across the DevOps lifecycle. Read this buyers’ guide for an overview of how to evaluate and select the right tool and vendor.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

VMware International Unlimited Company

Analyst Report: Concourse Labs is Shaping the Cloud Governance Market
sponsored by Concourse Labs
ANALYST REPORT: With cloud growing in popularity, organizations need a way to ensure they meet security and governance requirements in their new environment – which led to the inception of the cloud governance market. Read this analyst report for 451 Research’s evaluation of Concourse Labs’ cloud governance offering.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Managing Digital Risk: The Security Challenge Beyond Your Perimeter
sponsored by Mimecast
WHITE PAPER: Today’s security leaders are feeling the pressure that cyber risks presents to their organization’s reputation. But managing digital risk can sometimes be resource exhaustive. Read this Mimecast guide for an overview of modern challenges and how to overcome them.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Mimecast

Surviving Common Office 365 Security Pitfalls
sponsored by Quest
EGUIDE: Migrating from an on-prem active directory (AD) to a cloud-based directory, like Office 365, can put your users and organization at serious risk of a data breach – which can cost upwards of $4 million per incident, according to the Ponemon Institute. Read this e-guide for tips and guidance to securing your Office 365 migration.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Quest

Cybersecurity Automation for Dummies
sponsored by Infoblox
EBOOK: Automation is quickly becoming one of the most valuable capabilities for providing security across growing network landscapes. This eBook, Cybersecurity Automation for Dummies, provides additional insight and expert guidance regarding the role of automation in security programs.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Infoblox
1 - 25 of 1279 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info