IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
51 - 75 of 1316 Matches Previous Page  |  Next Page
The Benefits of Splunk For Security Operations
sponsored by Splunk
ANALYST REPORT: Splunk Enterprise Security (ES) and Splunk User Behavior Analytics (UBA) enable IT and security operations centers to identify, analyze, and mitigate advanced cyberthreats. Forrester interviewed several customers with experience using Splunk’s security solutions. Download the report to evaluate the potential financial impact of Splunk ES & UBA.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Splunk

Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK: Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Proofpoint

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

Top 3 Security Risks to Address When Managing a Remote Workforce
sponsored by Dtex
EBOOK: Over the past decade, there has been a significant increase in the number of employees working from home. Despite the health and corporate benefits of working remotely, there are serious security risks that come with this trend. Read this e-book to learn about the top 3 security risks companies are facing with their remote workforce.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Dtex

Leveraging the Cloud to Reinforce 7 Critical Layers of Security
sponsored by Hyland
EBOOK: If your data and your customers’ data is vulnerable to incursions or catastrophic events, the future of your business isn’t safe. Without proper defensive measures, your data is unprotected and your ability to service customers can be impacted. View this e-book to learn how to leverage the cloud to maximize 7 critical layers of security.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Hyland

NWN Security
sponsored by NWN Corporation
VIDEO: For NWN, security is about risk, control and measurement – they took these pillars into consideration when crafting their security offering. Watch this short video for an overview of NWN’s cybersecurity vision and capabilities.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

NWN Corporation

Top Security Orchestration Use Cases
sponsored by Palo Alto Networks
WHITE PAPER: As security alert volumes reach an all-time high, analysts are often left feeling overworked or fatigued. To help with the SecOps workload, organizations have begun adopting security orchestration as a way of unifying disparate security tools and teams. But what is security orchestration and how does it help? Read on to find out.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Palo Alto Networks

Leveraging Ivanti to Accelerate Time to Value at a Lower Cost
sponsored by Ivanti
CASE STUDY: When considering an operational upgrade, banks must take deliberate precautions to ensure they’re adhering to regulatory requirements. This case study overviews Woodforest National Bank’s journey towards an improved IAM program, highlighting their key challenges and how they partnered with Ivanti to overcome them.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Ivanti

Plenty of Phish: Why We Need a New Approach to Email Security
sponsored by Darktrace
VIDEO: The shift towards remote workforces has introduced a series of new phishing and other email security threats. Unfortunately, inbox gateways and other traditional email security methods no longer cut it. Watch this webinar for a closer look at these new challenges and discover Darktrace’s Immune System Approach to email security.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

Darktrace

Why DevOps Has Not Become DevSecOps
sponsored by WhiteHat Security
WEBCAST: Access this white paper to see the 6 myths that are contributing to the lack of DevSecOps adoption, watch as they are easily debunked, and learn 8 recommendations moving forward with this new understanding.
Posted: 18 Nov 2020 | Premiered: Nov 18, 2020

WhiteHat Security

Security Orchestration for Dummies
sponsored by Palo Alto Networks
EBOOK: Security orchestration emerged as a way of supporting the tireless efforts of understaffed and overworked security teams. The following eBook, Security Orchestration for Dummies, explains security orchestration in 6 short chapters – read on to unlock your copy.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Palo Alto Networks

The 2020 State of Security Operations
sponsored by Palo Alto Networks
RESEARCH CONTENT: As a result of siloed and overly-complicated security operations, analysts are left to process a massive volume of alerts – leading to fatigue and subpar security outcomes. To better understand the state of SecOps, Palo Alto Networks commissioned Forrester to conduct a study. Read on to unlock your copy.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Palo Alto Networks

The Evolution of Evidence Collection
sponsored by Aptible
EBOOK: Evidence collection is mundane & exhausting, and what’s worse is that it can happen once a quarter or more. But despite its time-consuming nature, evidence collection is critical to passing an audit & proving compliance. By reading this guide, you can learn how to leverage automation to make evidence collection a bit less painful.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

Aptible

At A Glance: CrowdStrike® Falcon Discover™ For AWS
sponsored by AWS & CrowdStrike
PRODUCT OVERVIEW: As organisations opt to host more of their data in the cloud, securing their cloud environments has never been more important. This solution brief offers 5 considerations for choosing a cloud security solution and highlights how CrowdStrike’s Falcon Defense CrowdStrike Falcon Discover can address common AWS challenges – read on to get started.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

AWS & CrowdStrike

Success from the Start: Top Tips For Beginning An ID Badge Or Card Program
sponsored by HID Global
EBOOK: For organizations embarking on an ID badge/card program there are a number of key implementation steps and often overlooked – but vital – considerations to make to ensure success from the start. This eBook provides insight into these planning considerations, and more – read on to unlock your copy.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

Fargo® Ink1000
sponsored by HID Global
DATA SHEET: Classrooms, offices and stores are beginning to open their doors again, and employees need an effective, secure and reliable card printer for their return to business as usual. Introducing the HID FARGO® INK1000desktop-based card printer. Read this data sheet to learn more about the Fargo Ink1000 Inkjet card printer from HID.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

BlackBerry Cylance 2020 Threat Report
sponsored by BlackBerry
RESEARCH CONTENT: The comprehensive findings from the BlackBerry Cylance 2020 Threat Report provide a holistic summary of the trends and vulnerabilities of this year’s most common and prominent cyberthreats. Read on to learn more about 2020’s threat landscape and prepare your organization for 2021’s cyberthreats.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

BlackBerry

Market Guide for Managed Detection and Response Services
sponsored by Expel
WHITE PAPER: According to Gartner, “By 2025, 50% of organizations will be using MDR services for threat monitoring, detection and response functions that offer threat containment capabilities. Ensure the MDR provider is experienced and that their technology stack fits well with your existing security controls and IT environment, from on-premises to cloud.”
Posted: 13 Nov 2020 | Published: 26 Aug 2020

Expel

The 7 Secrets Of Top Performing Analysts
sponsored by Sixgill
EBOOK: For security analysts (and other cybersecurity pros), the ever-growing skills gap means more work for each team member – in most cases, the high-stress nature of the job has shown to lead to fatigue and burnout. This eBook provides 7 pieces of advice from top analysts, to help you with your data-to-day performance – read on to get started.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Sixgill

The Key To Successful Digital Transformation In Banking
sponsored by Onegini
WHITE PAPER: In order to compete with FinTechs, banks need to rethink their digital presence to ensure a secure and user-friendly experience. But digital transformations are far from simple. This helpful guide explores some of the challenges of going digital, as well as an overview of their Onegini’s Identity Cloud offering – read on to get started.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Onegini

Simplified RACF Management
sponsored by Beta Systems
DATA SHEET: Access this data sheet from Beta Systems to learn about _beta access for RACF, a solution that delivers simple administration, monitoring, and auditing of your z/OS security system, replacing the costly tools you use today while providing the same functionality.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Beta Systems

Sixgill Report: Remote Desktop Protocol (RDP)
sponsored by Sixgill
PRODUCT OVERVIEW: Compromised remote desktop protocols (RDPs) are a goldmine for ransomware actors looking to make a quick buck during the pandemic. This report provides a closer look at the threat facing RDPs and how organizations can protect their remote workers – read on to get started.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Sixgill

Sixgill And Threat Intelligence Program Modernization
sponsored by Sixgill
PRODUCT OVERVIEW: Threat intelligence plays a vital role in not only addressing current challenges, but also proactively protecting the organization against potential or future threats. This ESG Showcase research report provides an overview of Sixgill’s threat intelligence offering, designed to help organizations address their cybersecurity imperatives.
Posted: 12 Nov 2020 | Published: 31 Oct 2020

Sixgill

Business Continuity Management: Planning, Disaster Recovery & Crisis Response
sponsored by ServiceNow
PRODUCT OVERVIEW: Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Turn a Mobile App Into a Major Win
sponsored by Onegini
CASE STUDY: For organizations in the healthcare industry, mobile applications and telemedicine are becoming the norm. Read this case study to see how VGZ, one of the largest health insurers in the Netherlands, was able to build an application that was secure, complaint and faster than their website – without sacrificing user experience.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Onegini
51 - 75 of 1316 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info