IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
51 - 75 of 740 Matches Previous Page  |  Next Page
Root out Ransomware before it Strikes with Passive DNS & Threat Intelligence
sponsored by Farsight Security
CASE STUDY: Find out how to rapidly distinguish between legitimate web hosts and subverted infrastructure that's used to launch malware campaigns with a passive DNS strategy that leverages threat analytics and intelligence.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

TOPICS: 
Farsight Security

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

TOPICS: 
ComputerWeekly.com

Simplify Compliance for FFIEC-NCUA with a Security Operations Center
sponsored by Arctic Wolf
WHITE PAPER: Find out how financial organizations can simplify FFIEC/NCUA compliance by leveraging a security operations center as a service (SOCaaS).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

TOPICS: 
Arctic Wolf

Burnt by a SIEM
sponsored by Arctic Wolf
RESOURCE: Many good teams struggle mightily with SIEM implementation, which typically takes more than 12 months to start delivering value. Inside, learn about painful scenarios due to SIEM weighing you down, and find out how a SOC-as-a-service provider can deliver what SIEM alone can't.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

TOPICS: 
Arctic Wolf

Pennsylvania Housing Finance Agency Replaces MSSP with AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Find out how the IT staff at the Pennsylvania Housing Finance Agency (PHFA) realized they needed to do more to address today's threat landscape, and why they selected a SOC-as-a-service to meet their security needs. Continue reading to uncover the challenges PFHA faced that led them to a new first line of defense.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

TOPICS: 
Arctic Wolf

Help for CISOs Overwhelmed by Cybersecurity Threats
sponsored by MASERGY
WHITE PAPER: Find out how to build your security strategy on a foundation of executive and senior IT-level collaboration, supported by managed detection and response services.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

TOPICS: 
MASERGY

CW Benelux ezine August 2018
sponsored by ComputerWeekly.com
EZINE: It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".
Posted: 03 Aug 2018 | Published: 09 Aug 2018

TOPICS: 
ComputerWeekly.com

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

TOPICS: 
Splunk

Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018

TOPICS: 
ServiceNow

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

TOPICS: 
OneLogin

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

TOPICS: 
OneLogin

5 Key Steps for GDPR Compliance
sponsored by Plixer
RESOURCE: Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.
Posted: 11 Jul 2018 | Published: 02 Jul 2018

TOPICS: 

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

TOPICS: 
ThreatX

Vendor Risk Management Guide: The 3 Fundamentals
sponsored by CyberGRX
WHITE PAPER: This white paper explores the basic components of a complete vendor risk management (VRM) program.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

TOPICS: 
CyberGRX

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

TOPICS: 
Arctic Wolf

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

TOPICS: 
Arctic Wolf

How to Protect Against the Top 5 Cyberattacks
sponsored by Arctic Wolf
WHITE PAPER: Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

TOPICS: 
Arctic Wolf

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

TOPICS: 
Akamai Technologies

Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE: It's likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

TOPICS: 
Akamai Technologies

Adopt DNS Best Practices to Proactively Protect Against Malware
sponsored by Akamai Technologies
RESOURCE: The cyber threat landscape is dynamic and accelerating. The DNS is a vulnerability in many organizations' defenses that malicious actors are increasingly exploiting. Explore these DNS best practices that can aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Posted: 20 Jun 2018 | Published: 30 Sep 2017

TOPICS: 
Akamai Technologies

Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER: The moats and castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is simpler, more secure, and a convenient way to protect your enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017

TOPICS: 
Akamai Technologies

What Happens When a Business Decides to Prevent Attacks Instead of React to Them?
sponsored by Cylance
VIDEO: Formel D is the global service provider for the automotive industry, where Global IT Manager Robert Osten oversees the teams responsible for building and maintaining the company's network in regards to threats. In this video, learn how Formel D used Cylance for their security needs, and how it compared to other systems they used in the past.
Posted: 12 Jun 2018 | Premiered: 23 May 2017

TOPICS: 
Cylance

Network Incident Response with NetFlow and Metadata
sponsored by Plixer
RESOURCE: Find out how you can tap into NetFlow and metadata, resources that are all-too-often underutilized for driving visibility into network infrastructure and providing a context for effective incident response, with a centralized network traffic analytics database.
Posted: 07 Jun 2018 | Published: 29 Jun 2017

TOPICS: 

Streamline Network Management, Monitoring, and Security: Demo
sponsored by Cato Networks
VIDEO: Watch this brief demo of a network security platform that's designed to help you simplify network monitoring and drive visibility into the apps, users, and devices on your network.
Posted: 06 Jun 2018 | Premiered: 30 Mar 2017

TOPICS: 
Cato Networks

3 Microsegmentation Challenges Facing NetOps and SecOps
sponsored by Plixer
RESOURCE: Learn about 3 key microsegmentation challenges and find out how organizations can further improve their network's defense with cooperation and open communication across their app/virtualization, NetOps, and SecOps teams.
Posted: 01 Jun 2018 | Published: 29 Mar 2018

TOPICS: 
51 - 75 of 740 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement