IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
1 - 25 of 1024 Matches Previous Page  |  Next Page
The State of Security Automation Architectures: Consolidated Key Findings
sponsored by Juniper Networks
RESEARCH CONTENT: Learn about the growing importance of a security automation architecture to cybersecurity by exploring some of the Ponemon Institute's key findings about the role of automation in incident response, security analytics, SIEM, and more.
Posted: 17 Jul 2018 | Published: 30 Apr 2018

Juniper Networks

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

5 Key Steps for GDPR Compliance
sponsored by Plixer
RESOURCE: Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.
Posted: 11 Jul 2018 | Published: 02 Jul 2018


Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

McAfee Skyhigh Security Cloud for Office 365
sponsored by McAfee, Inc.
RESOURCE: Use this resource to take an in-depth look at McAfee Skyhigh Security Cloud for Office 365 to help your organization securely accelerate your business by providing total control over data and user activity.
Posted: 03 Jul 2018 | Published: 03 Jul 2018

McAfee, Inc.

Keeping SIEM Simple and Actionable
sponsored by Fortinet, Inc.
WEBCAST: Security information and event management (SIEM) tools can be extremely effective for managing security, performance and compliance. However, SIEMs can often be too complex to be used effectively. Listen in on the webcast to learn how to keep your SIEM simple and actionable
Posted: 03 Jul 2018 | Premiered: Jul 3, 2018

Fortinet, Inc.

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

ThreatX

Vendor Risk Management Guide: The 3 Fundamentals
sponsored by CyberGRX
WHITE PAPER: This white paper explores the basic components of a complete vendor risk management (VRM) program.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CyberGRX

How to Mitigate 5 Network Security Problems Affecting the Financial Industry
sponsored by Ixia - Keysight
WHITE PAPER: Find out how high-priority targets like financial industry organizations can overcome 5 critical IT security challenges, from reducing cybertheft to improving compliance.
Posted: 29 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

The SIEM Buyer's Guide: The Who, What, Where, When and Why of Buying an Analytics-Driven Security Solution
sponsored by Splunk
RESOURCE: In this buyer's guide, learn what a SIEM solution is, what it isn't, it's evolution, what it does and how to determine if it is the right security solution for your organization.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Splunk

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: In this white paper, explore a step-by-step journey on how to detect unknown malware activity and early signs of compromise in a Windows environment and find out how security analysts can gain a significant understanding of detailed activities on endpoint.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Splunk

How to Protect Against the Top 5 Cyberattacks
sponsored by Arctic Wolf
WHITE PAPER: Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Arctic Wolf

Coordinate Network Security Tools for a Unified Defense
sponsored by Ixia - Keysight
WHITE PAPER: Find out how to extend the reach of security tools to access the entire network, coordinating intrusion prevention/detection systems (IPS/IDS), data loss prevention (DLP), and firewalls into a single, staunch line of defense.
Posted: 28 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

How Machine Data Supports GDPR Compliance
sponsored by Splunk
WHITE PAPER: Discover 3 machine data use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment model – whether it's on-premise, in the cloud, or hybrid.
Posted: 26 Jun 2018 | Published: 31 Dec 2017

Splunk

Configure Security Policies for Endpoints & End-Users with Confidence
sponsored by IBM
RESOURCE CENTER: In this custom resource center, find out how your unified endpoint management (UEM) strategy can help you simplify policy configuration and enforcement.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

IBM

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

Akamai Technologies

SSL Attacks on the Rise
sponsored by Radware
EBOOK: Better arm yourself against SSL threats by learning about the different types of encrypted attacks, leading SSL vulnerabilities, your options for SSL protection, and more.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Radware

A Guide to Protecting Cryptocurrency from Web Threats and DDoS Attacks
sponsored by Imperva
WHITE PAPER: In this white paper, learn about the vulnerabilities in the emerging cryptocurrency market, and learn about the key components of cryptocurrency defense, including web application firewalls, DDoS protection, and content delivery network services.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Imperva

DDoS Mitigation and SSL Attack Protection Case Study
sponsored by Radware
CASE STUDY: In this case study, find out how one financial services company tag-teamed network security by adopting an on-premise DDoS appliance and SSL attack mitigation software to overcome the increased rate of cyberattacks assailing their organization.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Radware

DDoS Network Protection: TeraGo Case Study
sponsored by Radware
CASE STUDY: Find out how one IP network provider adopted market-leading DDoS detection and mitigation to protect their own infrastructure as well as their customers across its telco, data center, and cloud hosting environments.
Posted: 20 Jun 2018 | Published: 31 Dec 2016

Radware

How To Succeed in Data Loss Prevention (DLP) Projects
sponsored by Docauthority
WHITE PAPER: Inside, find out how AI and document security, combined with your DLP project, can help you to significantly improve the coverage for the data protected.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Docauthority

Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE: It's likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Akamai Technologies
1 - 25 of 1024 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement