IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
51 - 75 of 711 Matches Previous Page  |  Next Page
Forcepoint Cloud Access Security Broker (CASB) Assessment
sponsored by Forcepoint
RESEARCH CONTENT: This ESG report examines the Forcepoint Cloud Access Security Broker (CASB) to assess its ability to secure the use of any cloud apps across an organization's users and endpoints. Explore ESG's findings and discover how Forcepoint's CASB performs in terms of visibility, risk management, and protection.
Posted: 06 Sep 2018 | Published: 31 Mar 2018

Forcepoint

SOC-as-a-Service for Cloud Infrastructures and SaaS Applications
sponsored by Arctic Wolf
WHITE PAPER: Find out how to overcome some of the top security challenges facing hybrid cloud architectures – from data exfiltration to insider threats – with a security operations center as a service (SOCaaS).
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

How to Proactively Prevent Security Threats across Endpoints
sponsored by Cylance
RESEARCH CONTENT: This Forrester Total Economic Impact Report investigates the effect of Cylance on organizations' ability to protect their critical assets and endpoints.
Posted: 29 Aug 2018 | Published: 28 Feb 2018

Cylance

Combatting Botnet Traffic with Behavioral Analysis
sponsored by ThreatX
RESOURCE: Find out how to detect and block a number of different distributed attacks with a robust security approach that's designed to grant you visibility into malicious traffic.
Posted: 29 Aug 2018 | Published: 28 Jun 2018

ThreatX

Tightly Coupling Applications and Security for Infinite Scale
sponsored by ThreatX
RESOURCE: Find out how to modernize security so it can keep up with the demands of microservices and container-based app development.
Posted: 29 Aug 2018 | Published: 20 Aug 2018

ThreatX

5 Categories of Questions for Evaluating AI-Driven Security Tools
sponsored by Cylance
WHITE PAPER: With countless numbers of security tools boasting "AI and machine learning capabilities," AI has become something of a buzzword in the security world. But sometimes, there's some truth to the hype. Get tips on how to effectively evaluate AI-based security tools by learning about 5 useful categories of questions to ask.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cylance

The Predictive Advantage against Malware: It's About Time
sponsored by Cylance
RESOURCE: Find out how preventative, proactive security platforms like CylancePROTECT can help combat against increasingly advanced malware threats – both known and unknown.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cylance

Everything Starts with DNS: Making the Internet a Safer Place
sponsored by Farsight Security
RESOURCE: During an investigation into potential cybercriminal activity, there's usually a domain or IP address that serves as your starting point. Find out how to use the world's largest real-time and historical DNS intelligence database to bring new levels of insight to your investigation.
Posted: 23 Aug 2018 | Published: 23 Aug 2018

Farsight Security

How ThreatConnect Leverages DNSDB to Track Down Grizzly Steppe
sponsored by Farsight Security
WHITE PAPER: Find out how ThreatConnect used a passive DNS database intelligence approach to extend Grizzly Steppe data from the Joint Analysis Report and discover new indicators that expose cyberespionage activity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Farsight Security

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

ComputerWeekly.com

Simplify Compliance for FFIEC-NCUA with a Security Operations Center
sponsored by Arctic Wolf
WHITE PAPER: Find out how financial organizations can simplify FFIEC/NCUA compliance by leveraging a security operations center as a service (SOCaaS).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Arctic Wolf

Burnt by a SIEM
sponsored by Arctic Wolf
RESOURCE: Many good teams struggle mightily with SIEM implementation, which typically takes more than 12 months to start delivering value. Inside, learn about painful scenarios due to SIEM weighing you down, and find out how a SOC-as-a-service provider can deliver what SIEM alone can't.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Arctic Wolf

Pennsylvania Housing Finance Agency Replaces MSSP with AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Find out how the IT staff at the Pennsylvania Housing Finance Agency (PHFA) realized they needed to do more to address today's threat landscape, and why they selected a SOC-as-a-service to meet their security needs. Continue reading to uncover the challenges PFHA faced that led them to a new first line of defense.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

Arctic Wolf

CW Benelux ezine August 2018
sponsored by ComputerWeekly.com
EZINE: It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".
Posted: 03 Aug 2018 | Published: 09 Aug 2018

ComputerWeekly.com

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Splunk

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

ThreatX

Vendor Risk Management Guide: The 3 Fundamentals
sponsored by CyberGRX
WHITE PAPER: This white paper explores the basic components of a complete vendor risk management (VRM) program.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CyberGRX

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

How to Protect Against the Top 5 Cyberattacks
sponsored by Arctic Wolf
WHITE PAPER: Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Arctic Wolf

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

Akamai Technologies

Dwell Time as a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: Find out how security professionals can more accurately measure and report on dwell times so that they can identify when a threat enters their environment and work to remediate it faster.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Armor

What Happens When a Business Decides to Prevent Attacks Instead of React to Them?
sponsored by Cylance
VIDEO: Formel D is the global service provider for the automotive industry, where Global IT Manager Robert Osten oversees the teams responsible for building and maintaining the company's network in regards to threats. In this video, learn how Formel D used Cylance for their security needs, and how it compared to other systems they used in the past.
Posted: 12 Jun 2018 | Premiered: 23 May 2017

Cylance

The Essential Guide to Security: How You Can Solve Security Challenges
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 31 May 2018 | Published: 31 May 2018

Splunk

Healthcare Security: How You Can Ward Off Insider Threats
sponsored by Cisco Umbrella
EGUIDE: One of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.
Posted: 05 Sep 2018 | Published: 04 Sep 2018

Cisco Umbrella
51 - 75 of 711 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement