IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
26 - 50 of 1316 Matches Previous Page  |  Next Page
Remote and @ Risk
sponsored by Dtex
RESEARCH CONTENT: The global shift to enable remote workforces in 2020 created a number of operational hurdles and introduces a series of security risks – the most significant being insider threats. Read this threat report to learn more about the current state of security and how 2020 put organizations at higher risk.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Dtex

Taking Control of Your Post-COVID-19 Budget
sponsored by DomainTools
WEBCAST: With attackers taking advantage of the pandemic, threat surfaces increasing with remote work and budgets being reduced or postponed, security teams face a trifecta of challenges in maintaining or obtaining the resources they need to defend their organization. Watch this webcast featuring a CISO to learn how to make the most of the tools you have.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

How Certification Can Add Assurance for Digital Transformation at Scale
sponsored by Archetype
WEBCAST: The role of security and trust in delivering mass digital transformation will provide significant growth across multiple markets. But it’s important that security leaders move with the times. Watch this 20-minute webinar to learn the device level security baselines that anchor devices, services and insights together.
Posted: 24 Nov 2020 | Premiered: Jul 15, 2020

Archetype

How to Identify Threats Faster and Increase Productivity
sponsored by DomainTools
WEBCAST: With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

DomainTools

Success Patterns for Supply Chain Security
sponsored by Panorays
WHITE PAPER: Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Panorays

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

3 Steps to Building Business-Centered Data Protection
sponsored by InteliSecure
EGUIDE: Even though research suggests that security focused on protecting the perimeter is obsolete, organizations continue to invest resources towards this effort. Modern threats require a shift in cybersecurity mindset – an approach focused on protecting the people. Read on to learn more about this approach and how to implement it.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

InteliSecure

Understanding the Shared Security Model for Cloud Data Protection
sponsored by InteliSecure
EGUIDE: The new normal has organizations continuing to enable a largely remote workforce – leading to mass cloud migrations. Contrary to a popular misconception about cloud, these migrations could actually strengthen your security posture. Read this InteliSecure guide to find out how.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

InteliSecure

Compliance for Today’s Complex Audit
sponsored by Ivanti
EGUIDE: The stress and worry surrounding compliance audits are avoidable – so long as your organization adopts a people-centric, policy-automated approach to IT operations that’s inherently audit-ready. But how should you go about this? Read this following e-guide, Compliance for Today’s Complex Audit, which offers a blueprint for this approach.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Ivanti

Protect Against Evolving Data Security Threats
sponsored by Fasoo
EGUIDE: Today’s cyberthreats pose significant risk to an organization’s sensitive or confidential data. The following e-guide explores the most dangerous threat types and tactics facing organizations today and the steps you can take to protect your data – read on to unlock the full guide.
Posted: 24 Nov 2020 | Published: 23 Nov 2020

Fasoo

4 Data Privacy & Governance Risks Amid COVID-19
sponsored by Fasoo
EGUIDE: COVID-19 has caused several complications and challenges for security professionals – especially when it comes to data privacy and governance. Read this e-guide for an overview of the 4 most prominent data privacy risks in the era of COVID-19.
Posted: 24 Nov 2020 | Published: 20 Nov 2020

Fasoo

Minimizing Risk From Cyber-Threats: Focus On Reducing Time To Containment
sponsored by Claranet
WHITE PAPER: In order to minimize the growing risks from cyberthreats, CISOs and other security leaders are turning towards next-generation endpoint detection and response (EDR) tools – but how does the current iteration of EDR capabilities differ from the previous generation? Read on to find out.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Claranet

Managed Detection and Response (MDR) Services Buyers Guide
sponsored by Sophos
EGUIDE: Managed detection and response (MDR) tools are growing in popularity among security leaders as workloads grow in volume. The following buyers guide highlights the potential benefits and required capabilities of an ideal MDR tool and evaluates current offerings against these features – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Sophos

IT Risk Management: Comparing Top Vendors & Offerings
sponsored by ServiceNow
RESEARCH CONTENT: Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.
Posted: 23 Nov 2020 | Published: 11 Aug 2020

ServiceNow

To Pay Or Not To Pay: It’s About The Provider
sponsored by Radware
RESOURCE: Should a ransomware attack strike, would your organization pay the ransom fee or not? How do you calculate if it’s worth it to pay the fee or not? This Radware article breaks down the most critical factors that go into answering these questions – read on to see if you should pay.
Posted: 23 Nov 2020 | Published: 29 Oct 2020

Radware

Remote Working Is New To A Lot Of Organizations, But Not To Williams Racing
sponsored by Dtex
CASE STUDY: It’s no secret that to be successful in Formula 1, racing teams need to have a cohesive, synchronized strategy on race day – but what about the team members that aren’t at the track on race day? Read this case study to see how Williams Racing protects their remote workers and the role cybersecurity plays in their success.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Next Generation Endpoint Protection
sponsored by Claranet
WHITE PAPER: Traditional cybersecurity is no match for today’s endpoint security threats – so does that mean antivirus (AV) is dead? This buyer’s guide provides an overview of why traditional tactics – like AV – aren’t working, a new approach to endpoint security, and an evaluation of next-generation endpoint protection vendors – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Claranet

Securing Azure Environments: Insights from PetSmart, Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Microsoft Azure plays an important role in many organizations’ digital transformation initiatives. As such, it becomes critical to understand the capabilities, limitations and potential benefits of Azure. Watch this webinar to gain insights into Azure from experts at PetSmart, Microsoft and Barracuda.
Posted: 23 Nov 2020 | Premiered: 23 Nov 2020

Barracuda

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

Zero Trust Network Access
sponsored by VMware, Inc.
EBOOK: VMware Secure Access provides enterprises a way for their employees to leverage a secure and fast connection to cloud-based applications and corporate technical resources. Read the e-book to get the full details.
Posted: 20 Nov 2020 | Published: 31 May 2019

VMware, Inc.

Discover How to Remove Security Barriers and Experience the Benefits of Azure
sponsored by Barracuda
WEBCAST: Digital transformation is well underway, requiring profound changes—and bringing a host of new benefits. As you prepare your organization to begin or advance its migration to Azure, you want up-to-date, actionable info about best practices in the cloud—including security. Watch this webcast to become more informed on these practices.
Posted: 20 Nov 2020 | Premiered: Apr 2, 2020

Barracuda

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are becoming increasingly costly – in fact, the average global cost to remediate an attack is over $700,000. One of the best ways to protect against ransomware attacks is with properly configured endpoint protection. Read on to discover best practices for configuring your endpoint protection against ransomware.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Sophos

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Modern firewalls are highly effective at defending against ransomware attacks, but they need to be given the chance to do their job. In this whitepaper, discover how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.
Posted: 20 Nov 2020 | Published: 31 Aug 2020

Sophos

Foundstone Targeted Malware Threat Assessment 360
sponsored by McAfee
DATA SHEET: Reactionary approaches to cybersecurity are no longer viable, security teams need to actively hunt out threats and stop them before they strike. The following data sheet provides an overview of the Foundstone Targeted Malware Threat Assessment 360, designed to equip security pros with threat hunting capabilities – read on to learn more.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

McAfee
26 - 50 of 1316 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info