IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
101 - 125 of 1190 Matches Previous Page  |  Next Page
Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.
sponsored by Lacework
CASE STUDY: In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

Unlock the Value of Your AWS CloudTrail Data
sponsored by Lacework
PRODUCT OVERVIEW: As business environments become increasingly complex, threat detection becomes a daunting task. To help overburdened security analysts, Lacework designed a platform to detect anomalies and potential threats within your network, providing you with contextual behavioral analytics. Download this solution brief to learn more about the platform.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

Royal Holloway: Driverless vehicle security for military applications
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 09 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
WEBCAST: While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Okta

Hot Topic Live Okta Guy Mason
sponsored by Okta
WEBCAST: In this episode of Hot Topics Live, join the CIO of Bourne Leisure, a major player in the UK holiday and hospitality industry, as they discuss how the organization dealt with the pandemic and its ensuing lockdown.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Okta

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Data Catalogs for Privacy
sponsored by BigID
WHITE PAPER: The growing need for data privacy is a driving force for data catalogs: organizations need to be able to layer in context from personal, sensitive, and situational data to get value out of data management. Download this white paper to learn more about evolving traditional data catalogs to reflect the needs of the privacy age.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BigID

Securing the New Normal: A Virtual Happy Hour on Moving Forward
sponsored by RSA Conference
WEBCAST: In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.
Posted: 08 Jul 2020 | Premiered: Apr 7, 2020

RSA Conference

Wavefront Secures DevOps Environments at Scale with Lacework
sponsored by Lacework
CASE STUDY: Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Carson Living Secures Rapidly Growing Cloud Environment
sponsored by Lacework
CASE STUDY: Due to the rapid growth in adoption (400% in the past year) of their AWS-hosted application, Carson Living was facing issues related to ensuring cloud compliance and maintaining security configurations. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Five Key Elements of Continuous IT Compliance
sponsored by BMC
WHITE PAPER: As compliance regulations become more stringent, security and compliance teams are under additional pressure to ensure security, reduce risk and avoid conflicts. Download this white paper to learn more about a modern, intelligent approach to security – including 5 critical elements necessary for continuous IT compliance.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC

Driving Resiliency and Security in the Financial Services Industry
sponsored by BMC
WHITE PAPER: Resiliency is critical to the long-term success of the financial services industry. This is due to the amount of sensitive personal and financial data they manage that have attracted increasingly sophisticated cyberattack methods. Read on to discover best practices for ensuring security and resiliency of t financial services organizations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC

An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context
sponsored by Delve
WHITE PAPER: To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

Leveraging AI to Modernize Vulnerability Management and Remediation
sponsored by Delve
WHITE PAPER: Advances in AI provide organizations with the ability to automate workloads and offer intelligent decision-making capabilities, easing the burden on IT and security teams and allowing them to focus on strategic imperatives. Download this white paper to learn more about embracing AI to modernize vulnerability management and remediation.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce
sponsored by Okta
WEBCAST: Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.
Posted: 07 Jul 2020 | Premiered: Jul 7, 2020

Okta

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Thales

Cloud Migration Challenges
sponsored by BigID
PRODUCT OVERVIEW: Cloud migrations are nearing the point of necessity – even for highly regulated and risk-averse organizations. So, how can these organizations minimize risk, ensure data privacy and avoid costly disruptions? Read on to learn more about the challenges of cloud migration and how BigID is helping organizations overcome these obstacles.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

BigID

7 Ways AI Can Automate and Improve Vulnerability Management Operations
sponsored by Delve
WHITE PAPER: Although under-utilized, AI has the potential to streamline operations through automation while reducing vulnerability risk for vulnerability management operations. Read this white paper to discover 7 ways AI can automate and enhance traditional or stagnant vulnerability management operations.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Delve

MSPs: The 5 Essentials from Your Endpoint Security Partner
sponsored by Malwarebytes
EBOOK: When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

2019 Proofpoint Domain Fraud Report
sponsored by Proofpoint
WHITE PAPER: Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Proofpoint

Kaspersky Lab’s COVID-19 Relief Initiatives
sponsored by Kaspersky Lab
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020

Kaspersky Lab

How Threat Modeling & Attack Simulation Works
sponsored by Coalfire
WEBCAST: In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.
Posted: 06 Jul 2020 | Premiered: Jul 6, 2020

Coalfire

Data Minimization Challenges
sponsored by BigID
PRODUCT OVERVIEW: As the volume of data to manage grows exponentially, the need for data minimizations in cloud migrations and other cybersecurity endeavors becomes critical. Download this solution brief and discover how BigID can help organization to implement an automated approach to reduce security, compliance and governance risks.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

BigID

RSAC Resource Guide: U.S. Election Security 2020
sponsored by RSA Conference
EGUIDE: Many cybersecurity experts have expressed concerns about the security of the upcoming U.S. elections. This RSAC Resource Guide: U.S. Election Security 2020 compiles expertise from industry leaders to provide readers with the insight and information they need to understand this topic.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

RSA Conference
101 - 125 of 1190 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info