IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
1 - 25 of 1240 Matches Previous Page  |  Next Page
API Security Checklist
sponsored by Curity AB
EGUIDE: As APIs grow in usage, they become a more valuable target for cybercriminals. This API Security Checklist was written to help guide you on your journey towards protecting web APIs by offering insight into emerging threats, best practices and expert insights – read on to unlock the full guide.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Curity AB

AT&T Business: Customer Stories – NHS Management, LLC
sponsored by AT&T Cybersecurity
CASE STUDY: In this case study, see how NHS Management, a healthcare provider that supports 50 nursing homes, was able to address the growing security needs of their patients and establish a threat detection and incident response program that allowed them to protect and prevent unwanted access to patient data – read on for the full story.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

AT&T Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET: Threat detection and incident response is the bread and butter of an organization’s ability to quickly and reliably mitigate potential threats. Read this data sheet for a closer look at the capabilities and potential benefits of AT&T’s Managed Threat Detection and Response offering.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

How to Protect Your Organization with Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
WEBCAST: Security is spreading its wings. SD-WAN and cloud-based security are both being adopted at a high rate, and this adoption begins with conversations about cyber risk. Because security talent is in short supply, professionals need to find ways to fend off threats. Watch this webcast for a live demo of AT&T’s Managed Threat Detection and Response.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

AT&T Cybersecurity

RiskTech 100 2021 Research Report
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream

Seamlessly Scale Security on AWS with Fortinet
sponsored by Fortinet, Inc.
VIDEO: While cloud is at the foundation of modern innovation, it has the potential to introduce a new array of risks and threats to organizations that aren’t prepared. Watch this webinar – which features security leaders at Fortinet and AWS – to unlock best practices, expert insights, and more.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

JumpStart Guide to Application Security in AWS
sponsored by Fortinet, Inc.
VIDEO: Deploying and securing critical business applications in cloud environments is becoming a standard practice for today’s IT and security driven organizations. In this webinar, join security experts from SANS, Fortinet and AWS as they discuss how to deploy and security applications in AWS environments – watch now for exclusive insight.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

Helping Educators Defend their Web Applications with Amazon & Fortinet
sponsored by Fortinet, Inc.
VIDEO: Today’s distributed organizations operate outside what would be traditionally considered a perimeter. As a result, web application and API security are increasingly becoming the first line of defense for critical business asset. Watch this webinar to unlock exclusive insight regarding web app and API security from leaders at AWS and Fortinet.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Vendor Comparison and Analysis: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about these providers, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

AT&T Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET: Threat detection is one of the fastest-growing areas in cybersecurity, but talent is in short supply, leaving organizations to do more with less resources. And as cybercriminals become cleverer, the burden falls to the business to counter threats. Examine this data sheet to explore Managed Threat Detection and Response from AT&T.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

AT&T Cybersecurity

Consistent Security Posture, Firewalls in Minutes and Reduced Latency – Autodesk’s Cloud Transformation Story
sponsored by Fortinet, Inc.
WEBCAST: As part of a virtual data center project, Autodesk required that each of its Amazon Virtual Private Cloud (VPC) instances had its own firewall. That was a large task due to the hundreds of VPCs Autodesk has. In this webinar, learn how Fortinet’s Virtual Next-Gen Firewall consistently manages their security posture across all Amazon VPCs.
Posted: 15 Jan 2021 | Premiered: Oct 20, 2020

Fortinet, Inc.

Okta + Netskope + CrowdStrike + Proofpoint: Securely Enable Remote Work at Scale
sponsored by Okta
DATA SHEET: Security and access challenges have been magnified by the massive global shift towards remote work. Read this data sheet to see how Okta, Netskope, Crowdstrike and Proofpoint (also known as the Spectra Alliance) combine their efforts to enable organizations to securely enable remote work at scale.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Fidelis Extended Detection and Response (XDR)
sponsored by Fidelis
VIDEO: Security teams are responsible for more threats than ever before. As a result, security stacks are bloated, and analysts overloaded. What can security teams do to overcome this overload and get back to mounting coordinated responses? Take two minutes to watch this short video and exhibiting Fidelis’ Extended Detection & Response.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Fidelis

The Future of CIAM: 4 Trends Shaping Identity and Access Management
sponsored by Okta
WHITE PAPER: As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Global CISO Playbook for the New Normal
sponsored by Fidelis
EBOOK: It’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Fidelis

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Forcepoint

Building a New Future for Retail
sponsored by AT&T Cybersecurity and Fortinet
DATA SHEET: Today’s retailers have the opportunity to harness behavioral insights and customer data and transform yesterday’s interactions into streamlined, secure and highly personalized customer experiences. View this infographic to learn more about the threats, opportunities and best practices in modern retail.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

AT&T Cybersecurity and Fortinet

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl

The Neo-Security Architecture
sponsored by Curity AB
WHITE PAPER: The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Curity AB

Adapt to Long-Term Remote Work with Adaptive Access Policies
sponsored by Okta
VIDEO: Last year, organizations scrambled to enable their employees to work remotely – but how are organizations preparing for reality of a decentralized workforce for the long term? Watch this webinar to learn more about sustainable best practices for securing and enabling a remote workforce.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Okta

How the Security Inversion Impacts User and Data Protection
sponsored by Netskope
WHITE PAPER: Legacy cybersecurity methods are becoming increasingly inefficient against today’s cyberthreats. Modernizing the security model is necessary to ensure innovation and the protection of data and users. Read this white paper to learn more about ensuring effective security in a cloud and mobile-first world.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Netskope

Surviving Beyond the New Normal: It's More than Securing Your Remote Workers
sponsored by Okta
WEBCAST: In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.
Posted: 14 Jan 2021 | Premiered: Jan 14, 2021

Okta

Fortinet FortiGate: Bridging the cloud security gap
sponsored by Fortinet, Inc.
VIDEO: Cloud adoption is on the rise, and organizations need to ensure they’re scaling without compromising efficiency, reliability, security or control. Watch this short video to see how Fortinet is helping organization bridge this gap.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Fortinet, Inc.
1 - 25 of 1240 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info