IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
1 - 25 of 1020 Matches Previous Page  |  Next Page
Why Many Cloud Communications Providers Don't Like to Talk About Security, Compliance and Reliability
sponsored by 8x8, Inc.
WHITE PAPER: Learn how security, compliance and reliability are just as important for business communication systems and 10 tough questions you should ask your communications provider today.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

8x8, Inc.

10 Capabilities to Look For in an MDR Solution
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Arctic Wolf Networks, Inc.

Comparing Web Application Firewall Offerings
sponsored by Imperva
RESEARCH CONTENT: The WAF market is growing, driven by the adoption of cloud-based WAF service platforms. But before making a purchasing decision, read this research report which compares the strengths and weaknesses of offerings from 16 vendors.
Posted: 12 Mar 2018 | Published: 07 Aug 2017


Vendor Assessment: Print and Document Security
sponsored by HP
RESEARCH CONTENT: This IDC market report assesses HP as a print and document security services provider and their ability to prevent data and device-level security breaches.
Posted: 07 Mar 2018 | Published: 31 Oct 2017


Human to Machines: The Shift in Security Strategy with Machine Learning
sponsored by Oracle
WHITE PAPER: Today's IT security strategy must evolve to focus on internal threats and securing what matters like customer data, financial data and business-critical applications. In this white paper, gain valuable insights into how machine learning brings a new level of sophistication to cybersecurity threat prediction, prevention, detection and response.
Posted: 07 Mar 2018 | Published: 07 Mar 2018


Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017


Zero-Day Malware Protection for the Enterprise Network
sponsored by Radware
RESOURCE: Nearly 50% of malware targeting enterprises are zero-day exploits that are not recognized by existing signature-based defenses. Tap this resource to learn how to defend against zero-day malware by integrating machine learning algorithms into existing protection mechanisms and defense layers.
Posted: 28 Feb 2018 | Published: 28 Feb 2018


Mobile security moving to a unified approach
sponsored by
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015


Phoenix Contact's mGuard Integration with SilentDefense
sponsored by SecurityMatters
RESOURCE: This resource uncovers the key benefits of the integration of mGuard and SilentDefense to make industrial networks more resilient to cybersecurity threats and enable users to quickly identify and react to network malfunctions.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


Industrial Networks Visibility & Control
sponsored by SecurityMatters
RESOURCE: To defend control networks, it is imperative to monitor network and process operations to detect dangerous messages. Leverage this resource to gain full visibility and control over industrial networks, while protecting from unauthorized access.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


Is Microsoft Office 365 Backup & Recovery Good Enough?
sponsored by Mimecast
RESEARCH CONTENT: The following Gartner research report provides background on the adoption of Office 365, limitations on data protection and recovery as well as guidance on how to use third-party providers in your cloud strategy.
Posted: 27 Feb 2018 | Published: 31 Dec 2017


Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

CW Nordics ezine February 2018
sponsored by
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 19 Feb 2018 | Published: 22 Feb 2018

Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive
sponsored by Splunk
VIDEO: This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards.
Posted: 15 Feb 2018 | Premiered: 05 Dec 2017


Future-Proof Your Tactical IAM Projects
sponsored by One Identity
EBOOK: This e-book provides insight into how to overcome barriers to identity and access management (IAM) success by future-proofing your tactical IAM projects.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

How to Design and Maintain a Secure ICS Network
sponsored by SecurityMatters
WHITE PAPER: Learn about the IEC 62443 standards and their limitations so that you can reduce the exposure of industrial networks to constantly evolving threats with analytics, network segmentation, enhanced threat detection, and more.
Posted: 12 Feb 2018 | Published: 16 Jul 2015


Security Trends in a Post-WannaCry Environment
sponsored by Juniper Networks
RESEARCH CONTENT: 68% of IT and security pros have increasing levels of concerns about ransomware over the next 3 years, according to a recent Juniper Networks report. Delve deeper into the study to learn more about security trends.
Posted: 12 Feb 2018 | Published: 31 Oct 2017

Juniper Networks

The City of Frankfurt Enables Work from Home with Two-Factor Authentication
sponsored by One Identity
CASE STUDY: Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.
Posted: 12 Feb 2018 | Published: 31 Dec 2015

One Identity

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WHITE PAPER: Access this SANS review to learn about the key benefits of deception technology and how to successfully deploy it in your network security strategy.
Posted: 12 Feb 2018 | Published: 31 May 2017

Illusive Networks

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016


Breach Prevention: The New Way Forward
sponsored by NSS Labs
WHITE PAPER: Attackers are able to bypass traditional endpoint and perimeter-based security solutions. This white paper explains why organizations are adopting breach detection systems (BDS) to evolve with the ever-changing threat landscape.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

NSS Labs

The Rising Face of Cybercrime: Ransomware
sponsored by BitSight
RESEARCH CONTENT: This BitSight Insights Report examines the cybersecurity performance of nearly 20,000 organizations in the face of rising ransomware attacks. Uncover the report's 5 key findings about the different types of ransomware attacks across industries like education, government, and finance.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

1 - 25 of 1020 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement