IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
126 - 150 of 1190 Matches Previous Page  |  Next Page
MSP best practices for securing servers
sponsored by Malwarebytes
DATA SHEET: Servers are the backbone of any managed service provider (MSP) making them a major target for spyware and ransomware. Access this data sheet to learn 4 best practices for securing your servers to ensure your organizations critical information is safe from online attackers.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

Light Agent or Agentless
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Kaspersky Lab

How malware authors make attack detection simple yet complex
sponsored by Cisco Umbrella
VIDEO: Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.
Posted: 02 Jul 2020 | Premiered: 01 Jun 2020

Cisco Umbrella

Privacy Essentials for Security Professionals
sponsored by BigID
DATA SHEET: Today’s security professionals face growing pressure – both internally (cybersecurity initiatives) and externally (CCPA, GDPR & other data privacy regulations). This data sheet outlines key consideration areas to help organizations meet compliance requirements and ensure data protection across their environment.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Discovery-In-Depth: The Path to Data Intelligence
sponsored by BigID
WHITE PAPER: Data discovery is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Auth0’s Approach to Information Security Identity in the Real World
sponsored by Auth0
WHITE PAPER: Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Auth0

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

The Evolving Role of SaaS and IT Outsourcing in SMB IT Security
sponsored by Kaspersky Lab
WHITE PAPER: For SMBs, getting the maximum use out of every resource is critical to long term success and profitability. However, SMBs are not immune to the security risks that come from embracing evolving IT capabilities. Download this white paper to learn more about the security challenges, threats and opportunities as they relate to SMBs.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Kaspersky Lab

Birst Security and Reliability
sponsored by Infor
WHITE PAPER: The following white paper provides an in-depth look at the key security capabilities of Birst, an Infor company. Download this white paper to learn how Birst ensure the protection and privacy of their customers data and discover how they maintain high data security standards.
Posted: 01 Jul 2020 | Published: 01 Jul 2020


Why AWS + Auth0
sponsored by Auth0
WHITE PAPER: Implementing the right IAM or customer IAM tool in your AWS ecosystem requires thoughtful planning. This 52-page white paper provides a comprehensive collection of expertise, best practices and project planning insights for using AWS & Auth0 to set up an API gateway and protect your critical applications.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Mistakes to Love: A Survey of Identity Mistakes
sponsored by Auth0
WHITE PAPER: For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Dexar Group Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Dexar Group, a real estate and property management organization, as they partner with ForwardIT to deploy CylancePROTECT and reduce the time and effort needed to managed their nearly 450 endpoints, addressing the security needs of their remote employees and BYOD devices.
Posted: 30 Jun 2020 | Published: 01 Jul 2020

BlackBerry

Is There A Revolution in IT Security ...Or Is It Just Wishful Thinking?
sponsored by Kaspersky Lab
WHITE PAPER: In a recent survey of 5,500 companies across 26 countries, 90% admitted to suffering a security incident, and 46% had lost sensitive data due to a threat. Selecting the right security tool that fits your business needs is a critical process. Download this guide to learn how assess security solutions and separate fact from hype.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

Kaspersky Lab

Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era
sponsored by BlackBerry
RESOURCE: In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.
Posted: 30 Jun 2020 | Published: 15 Jun 2020

BlackBerry

B&R Enclosures Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow B&R Enclosures, leading specialist in the design and manufacture of industrial equipment in the ‘Australasia’ region, as they incorporate CylancePROTECT in the wake of 2 ransomware attacks in order to leverage the power of AI to detect and prevent future malware and ransomware campaigns.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

BlackBerry

Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

Cyber Security for Business – Counting the Costs, Finding the Value
sponsored by Kaspersky Lab
WHITE PAPER: “Do more with less” is something of a mantra for IT and security professionals, who are tasked with maximizing the efficiency of their resources at the lowest possible cost. So, how can this mentality be applied without sacrificing the performance of a cybersecurity tool? Read this white paper to find out.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Kaspersky Lab

The Australian Museum Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Australian Museum, keepers of a vast collection of sensitive historic and cultural information, as they partner with CylancePROTECT to implement a multi-layer approach to security that enables them to prevent malware attacks and secure their invaluable research data.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

BlackBerry

An Ideal Match with Analyst's SOAR Recommendations
sponsored by Palo Alto Networks
DATA SHEET: According to Gartner, the ‘ideal’ SOAR solution is defined by the convergence of security orchestration and automation, incident response, and threat intelligence. These capabilities are native to the Cortex XSOAR platform – but does that make it ideal? Read this data sheet to see how Cortex XSOAR stacks up to Gartner’s recommendations.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Palo Alto Networks

Cortex XSOAR
sponsored by Palo Alto Networks
DATA SHEET: Security teams are often overburdened with a growing volume of threats and security alerts that require manual attention. Download this data sheet for an in-depth look at Cortex XSOAR, a security platform designed to streamline security operation center (SOC) efficiency by empowering teams with enhanced automation and collaboration capabilities.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Palo Alto Networks

Cortex XDR Endpoint Protection Solution Guide
sponsored by Palo Alto Networks
PRODUCT OVERVIEW: To protect your endpoints against the threats used by today’s cyberattackers, prevention tactics and AI-based analysis tools are needed to simplify operations and outpace hackers. Download this solution guide for a closer look at Cortex EDR, a cloud-delivered agent designed to help with endpoint detection, protection and response.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Palo Alto Networks

Human Layer Security for Dummies
sponsored by Egress Software Technologies Inc
EBOOK: In order to address the growing risks stemming from human error, organizations are incorporating deliberate practices and establishing human layer security programs. To help you get started, Human Layer Security for Dummies outlines the risks, challenges and best practices for you to consider. Download the e-book to get started.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Egress Software Technologies Inc

Stop Targeted Attacks and Data Loss on G Suite
sponsored by Armorblox
PRODUCT OVERVIEW: Today’s cloud-delivered email inboxes require deliberate security measures that go above and beyond traditional on-prem email security practices and tools. Download this solution brief to learn more about Armorblox for G Suite, designed to prevent targeted cyberattacks and data loss on cloud-delivered email platforms.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Armorblox

Enhancing Security Automation
sponsored by TITUS
DATA SHEET: Download the following solution overview to discover how Titus’s security automation tools are equipping enterprises with the confidence to make accurate and effective data security decisions, bring context to cloud security policies, and more.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

TITUS

Data Security: Best Practices for Remote Workers
sponsored by TITUS
WEBCAST: How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.
Posted: 26 Jun 2020 | Premiered: Jun 26, 2020

TITUS
126 - 150 of 1190 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info