IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
151 - 175 of 1110 Matches Previous Page  |  Next Page
Blueprint: Modern Layered Security
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Enhance the Safety and Security of Your People, Assets and Operations
sponsored by Dell Technologies and Intel
WHITE PAPER: For organizations looking to keep pace with today’s dynamic world, the addition of each new IoT device requires storage, security, and performance considerations. In this white paper, take a closer look at today’s IoT challenges and discover how Dell is working to address them. Learn more about Dell solutions powered by Intel®
Posted: 01 Jun 2020 | Published: 01 Jun 2020

Dell Technologies and Intel

Executive Brief: Why Secure Mobile Access Is A Strategic Business Imperative
sponsored by SonicWall
WHITE PAPER: According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.
Posted: 29 May 2020 | Published: 29 May 2020

SonicWall

Data Security in today's borderless, multi-cloud landscape
sponsored by Forcepoint
WHITE PAPER: While mobile devices and cloud applications enable organizations to enhance productivity, scalability and cost-savings, these modern environments come with new security risks. Download this e-book to learn more about the current and expected challenges and discover the benefits of a people-centric approach to cybersecurity.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

A Buyer's Guide to Cloud Security
sponsored by Forcepoint
WHITE PAPER: Given the amount of critical data being hosted in the cloud, it should come as no surprise that organizations are taking careful steps to safeguard their sensitive information. In this buyer’s guide, explore evaluation criteria and a competitive analysis designed to equip you with the knowledge to find the right cloud security provider for you.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

DaaS Proactive Security Management
sponsored by HP Inc
RESOURCE: Managing the security of each user device is complicated, especially at large organizations with a mix of operating systems and device types. In this blog post, take a closer look at HP’s Proactive Security Management suite, designed to help organizations monitor their endpoints and proactively address and mitigate security issues.
Posted: 29 May 2020 | Published: 29 May 2020

HP Inc

Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric

Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs
sponsored by Dell SecureWorks
WEBCAST: The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.
Posted: 28 May 2020 | Premiered: May 28, 2020

Dell SecureWorks

A cybersecurity professional's guide to securing a remote workforce
sponsored by Forcepoint
EBOOK: Mobile devices and cloud-based applications enable teams to work remotely and improve productivity, agility, and innovation. However, as these environments grow so too do the security challenges. In this e-book, explore today’s security risks and discover how to secure and support today’s remote workforce, along with their devices.
Posted: 28 May 2020 | Published: 28 May 2020

Forcepoint

Top 10 Security Events to Monitor in Azure Ad and Microsoft 365
sponsored by Quest
WHITE PAPER: Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.
Posted: 28 May 2020 | Published: 28 May 2020

Quest

COVID-19: Keeping Your Vulnerability Management Program on Track
sponsored by Vulcan
RESOURCE: As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.
Posted: 28 May 2020 | Published: 26 Mar 2020

Vulcan

Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

All Good Remediation Strategies Begin with Collaboration
sponsored by Vulcan
RESOURCE: As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.
Posted: 27 May 2020 | Published: 06 Apr 2020

Vulcan

Hack the Pentagon Case Study
sponsored by Synack
CASE STUDY: The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.
Posted: 26 May 2020 | Published: 31 Oct 2018

Synack

How to Improve Your Enterprise VPN Security
sponsored by Vulcan
RESOURCE: The use of VPNs as a means to secure remote workers is nothing new. However, as social distancing and working from home become the new norm, organizations grow increasingly reliant on VPNs to maintain productivity and security. Read this article to discover 3 known VPN vulnerabilities and the steps you can take to remediate them.
Posted: 26 May 2020 | Published: 08 Apr 2020

Vulcan

Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST: As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020

Trend Micro

Building Security into Your Cloud IT Practices
sponsored by Lacework
WHITE PAPER: Increasing competitive pressures to improve customer experience and speed up the software development lifecycle pushes IT managers and developers to build fast, but not necessarily to build securely. The following guide offers expert advice from 7 distinguished security leaders to help your DevOps teams incorporate security.
Posted: 26 May 2020 | Published: 26 May 2020

Lacework

The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

Knock, Knock: Is This Security Thing Working?
sponsored by VMware
WHITE PAPER: 2020 is close to its halfway mark, so now is the perfect time to reflect on the current progress of cybersecurity initiatives, as well as your security posture as a whole. This SANS whitepaper provides a closer look at key issues and emerging trends in the cybersecurity landscape in order to help gauge your progress and guide your planning.
Posted: 22 May 2020 | Published: 31 Mar 2020

VMware

Runtime Memory Analysis: A Better Way Forward for Vulnerability Management
sponsored by Rezilion
WHITE PAPER: According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.
Posted: 22 May 2020 | Published: 22 May 2020

Rezilion

FilelessThreats 101
sponsored by Trend Micro
RESOURCE: This infographic provides a high-level overview of fileless threats: What they are, how they operate, where the vulnerabilities lie and how to protect against them. Read on to equip yourself with the knowledge to identify and prevent fileless attacks.
Posted: 21 May 2020 | Published: 21 May 2020

Trend Micro

Creating a DevSecOps Culture in Your Company
sponsored by Checkpoint Software Technologies
EBOOK: As organizations continue to embrace cloud architectures as their preferred business environment, security methods need to change to reflect the needs of an evolving landscape. In this e-book, you’ll learn more about why organizations are embracing DevSecOps and the Shared Responsibility Model to meet cloud security challenges.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

Best Practices for Remote Access in Disaster Mitigation and Recovery Scenarios
sponsored by Checkpoint Software Technologies
WHITE PAPER: Given current circumstances, it’s no surprise to see organizations enabling mass amounts of employees with remote access to their network. However, if done frantically, this shift can expose vulnerabilities. Download this white paper for guidance on implementing secure access for remote employees.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

The Problem with CVSS Scores & What It Means for Vulnerability Management
sponsored by Vulcan
RESOURCE: While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.
Posted: 21 May 2020 | Published: 02 May 2019

Vulcan
151 - 175 of 1110 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info