IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
1 - 25 of 991 Matches Previous Page  |  Next Page
Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

Citrix

Passive DNS for Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn about passive DNS tools that are designed to help corporate security teams to leverage their existing threat intelligence data better by adding critical contextual information.
Posted: 23 May 2018 | Published: 31 Dec 2017

Farsight Security

GDPR 101: Key Information MSPs Should Know
sponsored by Solarwinds MSP
EBOOK: In this e-book, learn 10 invaluable tips for how to manage and prepare for the GDPR that apply directly to MSPs.
Posted: 23 May 2018 | Published: 31 Dec 2017

Solarwinds MSP

Spear Phishing: The #1 Threat
sponsored by Farsight Security
RESOURCE: Find out how you can combat spear phishing with a Newly Observed Domains (NOD) platform that integrates with your company's DNS to help you identify all new domains, assess potential threats, and prevent attacks from infiltrating your systems.
Posted: 22 May 2018 | Published: 31 Dec 2016

Farsight Security

Security Operations Center: Build on the Native Security Features of AWS and Office 365
sponsored by Arctic Wolf
WEBCAST: This webcast explores the field of top cybersecurity threats and covers best practices for securing cloud deployments. Find out what cloud services providers like AWS and apps like Office 365 are already doing to secure information as well as how you can build on that foundation to further bolster your defenses.
Posted: 18 May 2018 | Premiered: Dec 31, 2017

Arctic Wolf

Where to Invest Next: Guidance for Maturing Cyber Defenses
sponsored by CrowdStrike
WHITE PAPER: Take a look at the security staffing, processes and technologies that are common to most mature and maturing organizations.
Posted: 16 May 2018 | Published: 16 May 2018

CrowdStrike

Protect Critical Assets with Microsegmentation Technology
sponsored by Unisys
RESOURCE: Learn about microsegmentation, a new way to combat constantly evolving security threats by breaking your network into smaller elements that can be managed with granular IT security policies.
Posted: 15 May 2018 | Published: 15 May 2018

Unisys

Identity Analytics: A More Comprehensive Defense in the Battle to Reduce Risk and Enhance Security
sponsored by One Identity
RESOURCE: This resource focuses on "entitlement bloats" that may be putting your organization at risk for undetectable bad actors and threats. Learn how to reduce your attack surface by eliminating unnecessary or dormant entitlements before someone can abuse or exploit them.
Posted: 11 May 2018 | Published: 29 Dec 2017

One Identity

Prepare for when Breaches Happen
sponsored by Arctic Wolf
CASE STUDY: Many security vendors focus on internet and network perimeter defense – but in today's environment, that's not enough. Discover how you can access an SOC-as-a-service platform that can help you be prepared for when breaches happen.
Posted: 09 May 2018 | Published: 31 Dec 2017

Arctic Wolf

Rethink Enterprise Security Monitoring In The Cloud Computing Era
sponsored by Google Cloud
ANALYST REPORT: A spotlight report by Forrester finds that new security monitoring challenges exist with the cloud. This report focuses on 457 respondents surveyed in EMEA – including IT security pros in the UK, Germany, France, Italy, Netherlands and Spain.
Posted: 01 May 2018 | Published: 31 Oct 2017

Google Cloud

5 Reasons to Migrate to a Modern Endpoint Protection Platform
sponsored by McAfee, Inc.
RESOURCE: Multiple endpoint security agents, point product deployments, and numerous management consoles can be an unsustainable approach to endpoint security. Explore 5 reasons you should consider moving to a modern endpoint protection platform that integrates multiple defenses into a single framework.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

McAfee, Inc.

How to Extend Your Disaster Recovery into AWS
sponsored by Tech Data - Check Point/Mosaic451
RESOURCE: In this resource, you'll learn 3 design principles to take into consideration when protecting your DR sites in the cloud. In addition, learn about a tool that takes advantage of the automation efficiencies in AWS to create an encrypted VPN tunnel between on, and off premise data tools.
Posted: 26 Apr 2018 | Published: 31 Jan 2017

Tech Data - Check Point/Mosaic451

Integrating, Coordinating, and Orchestrating Enterprise Security Tools
sponsored by Proofpoint, Inc.
VIDEO: Organizations have made significant investments in security technology in the last few years, but these tools are often underutilized due to staff capacity or skills. This webinar explores the security orchestration challenge organizations are facing today.
Posted: 24 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

Why Many Cloud Communications Providers Don't Like to Talk About Security, Compliance and Reliability
sponsored by 8x8, Inc.
WHITE PAPER: Learn how security, compliance and reliability are just as important for business communication systems and 10 tough questions you should ask your communications provider today.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

8x8, Inc.

10 Capabilities to Look For in an MDR Solution
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Arctic Wolf Networks, Inc.

Vendor Assessment: Print and Document Security
sponsored by HP
RESEARCH CONTENT: This IDC market report assesses HP as a print and document security services provider and their ability to prevent data and device-level security breaches.
Posted: 07 Mar 2018 | Published: 31 Oct 2017

HP

Human to Machines: The Shift in Security Strategy with Machine Learning
sponsored by Oracle
WHITE PAPER: Today's IT security strategy must evolve to focus on internal threats and securing what matters like customer data, financial data and business-critical applications. In this white paper, gain valuable insights into how machine learning brings a new level of sophistication to cybersecurity threat prediction, prevention, detection and response.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017

Radware

Zero-Day Malware Protection for the Enterprise Network
sponsored by Radware
RESOURCE: Nearly 50% of malware targeting enterprises are zero-day exploits that are not recognized by existing signature-based defenses. Tap this resource to learn how to defend against zero-day malware by integrating machine learning algorithms into existing protection mechanisms and defense layers.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Radware

Mobile security moving to a unified approach
sponsored by ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

ComputerWeekly.com

Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015

Nuix

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

CW Nordics ezine February 2018
sponsored by ComputerWeekly.com
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 19 Feb 2018 | Published: 22 Feb 2018

ComputerWeekly.com

Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive
sponsored by Splunk
VIDEO: This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards.
Posted: 15 Feb 2018 | Premiered: 05 Dec 2017

Splunk

Security Trends in a Post-WannaCry Environment
sponsored by Juniper Networks
RESEARCH CONTENT: 68% of IT and security pros have increasing levels of concerns about ransomware over the next 3 years, according to a recent Juniper Networks report. Delve deeper into the study to learn more about security trends.
Posted: 12 Feb 2018 | Published: 31 Oct 2017

Juniper Networks
1 - 25 of 991 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement