IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
76 - 100 of 1316 Matches Previous Page  |  Next Page
Application Security in the DevOps Environment
sponsored by HCL Software
RESEARCH CONTENT: Application security (AppSec) has grown in importance, especially in the DevOps environment. This report from the Ponemon Institute looks to understand the state of application vulnerabilities and testing, as well as AppSec risks, potential consequences, and best practices – read on to unlock the full report.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

HCL Software

Key Findings from the Verizon 2020 Payment Security Report
sponsored by Verizon
RESOURCE: In this infographic, discover a brief overview of the key features and findings from Verizon’s 2020 Payment Security Report (PSR) – which aims to illuminate the challenges business leaders are facing related to the payment industry, compliance, PCI DSS and more.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Verizon

The Role of Biometrics in Multi-Factor Security
sponsored by BIO-key International
EGUIDE: Biometrics offers organizations an additional method of authentication – therefor adding to their security. However, there are limitations to consider. Read this e-guide for a closer look at these concern areas and how to address them.
Posted: 12 Nov 2020 | Published: 28 Oct 2020

BIO-key International

SIG - AV-TEST Evaluates Secure Web Gateway and DNS-Layer Security Efficacy
sponsored by Cisco Umbrella
ANALYST REPORT: In September and October 2020 AV-TEST performed a review of comparable security offerings from Akamai, Infoblox, Palo Alto Networks, Netskope, Cisco, and Zscaler. The test was commissioned by Cisco to determine how well vendors protected remote workers against malware, phishing sites and malicious websites.
Posted: 11 Nov 2020 | Published: 30 Oct 2020

Cisco Umbrella

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Security Incident Response & Vulnerability Response: Cost Savings & Other Benefits
sponsored by ServiceNow
RESEARCH CONTENT: Cyberattacks are occurring at a more frequent rate than ever before – not to mention the increased complexity of today’s threats. To address this, organizations are turning to security operations tools, like ServiceNow’s. Read this Forrester Total Economic Impact report for a closer look at the key features and ROI of ServiceNow’s offering.
Posted: 11 Nov 2020 | Published: 31 Oct 2020

ServiceNow

IAM Automation: The Secret to Governance and Cybersecurity Success in Higher Ed
sponsored by Hitachi Vantara
RESOURCE: Remote and hybrid learning models require increased remote access – underlining the importance of effective IAM security and governance. But how can schools keep up with the growing number of remote devices? Automation. Read this article to learn how to incorporate IAM automation into higher ed institutions.
Posted: 11 Nov 2020 | Published: 08 Sep 2020

Hitachi Vantara

IAM Automation Controls Prevent the Risks in Higher Education
sponsored by Hitachi Vantara
RESOURCE: Higher education institutions face a unique set of identity and access management (IAM) challenges – namely finding and mitigating risks related to orphan and dormant accounts. Read this article to learn about how IAM automation controls can address these risks.
Posted: 11 Nov 2020 | Published: 30 Sep 2020

Hitachi Vantara

Case Study: Medical Devices & Securing the Healthcare Industry
sponsored by Rezilion
CASE STUDY: The healthcare industry has been a prime target of cyberattacks for several years, however COVID-19 brought most of these issues into the public eye. This case study highlights where the vulnerabilities lie and provides an overview of how Rezilion is working with healthcare device companies to prioritize and mitigate these risks.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Rezilion

2020 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Each year, Verizon releases a Payment Security Report, which aggregates findings across a number of security and compliance subject areas into valuable insights designed to help CISOs understand and overcome key security pitfalls, operational challenges and compliance roadblocks – read on for this year’s report.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Verizon

Bizcloud Experts Announces Acceptance Into AWS WAF Service Delivery Program
sponsored by AWS BizCloud
RESOURCE: AWS’ web application firewall (WAF) gives app dev teams the ability to design, deploy and protect enterprise web applications, distributed content, or APIs against common web exploits that potentially affect availability, compromise security or consume excessive resources. Read this article to learn about a new AWS WAF service delivery partner.
Posted: 10 Nov 2020 | Published: 21 Jul 2020

AWS BizCloud

Market Guide For Crisis/Emergency Management Solutions
sponsored by ServiceNow
RESEARCH CONTENT: The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.
Posted: 10 Nov 2020 | Published: 21 Aug 2020

ServiceNow

What Is Phishing
sponsored by Claranet
EGUIDE: More than a decade after its first appearance, phishing remains the most common and pervasive type of cyberattack – but what is phishing? Who is at risk? And what kinds of attack variants are there? For answers to these, and more, read this Phishing Educational Guide.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Securing SMBs in a World of Digital Transformation
sponsored by Claranet
WHITE PAPER: The era of digital transformation demands similar growth in security capabilities as well. While large enterprises have the resources to invest heavily in this area, small and medium businesses (SMBs) must be a bit more resourceful. Read this white paper, which highlights cybersecurity guidance for SMBs in the era of digital transformation.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Small Business Security: 4 Steps to Success
sponsored by Claranet
WHITE PAPER: Small businesses are popular targets for today’s hackers. However, by investing in right cybersecurity tools, these small businesses can significantly reduce their risk and facilitate good business growth. The following white paper provides 4 steps for small business cybersecurity success – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Mapping the Ransomware Landscape
sponsored by Claranet
WHITE PAPER: By 2021, ransomware is expected to have a global impact of $20 billion – these threats are growing in their severity, frequency and complexity. This guide from Claranet explores changes in the threat landscape, highlights emerging variants and offers best practices for your organization to implement – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Continuous Application Security with HCL AppScan
sponsored by HCL Software
PRODUCT REVIEW: This Enterprise Strategy Group (ESG) Technical Review highlights ESG’s evaluation of HCL AppScan and how it helps developers continuously secure applications. The review also discusses how to integrate AppScan into CI/CD pipelines and support other aspects of DevSecOps initiatives – read on for the full review.
Posted: 06 Nov 2020 | Published: 31 Aug 2020

HCL Software

Thales’ SafeNet Trusted Access Brings Security To Access And Authentication
sponsored by Thales
PRODUCT REVIEW: Selecting an identity and access management (IAM) tool that balances functionality with security can be difficult. This product review, written by third-party cybersecurity expert David Strom, provides a comprehensive overview and assessment of Thales’ SafeNet Trusted Access tool – read on to see what Strom has to say.
Posted: 06 Nov 2020 | Published: 31 Jan 2020

Thales

Continuous Security – Putting it all Together
sponsored by HCL Software
WHITE PAPER: Traditionally, Security Maturity models were linear in their approach – suggesting that true security has some sort of end goal. However, cybersecurity requires a more continuous and cyclical approach in order to constantly ensure security is adequate. Read this e-guide to learn more about achieving continuous cybersecurity.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

HCL Software

Cloud Security: A Buyer’s Guide
sponsored by Forcepoint
BROCHURE: The cloud security market boasts an overwhelming array of features, vendors and offerings. To help break up the noise, this Cloud Security: Buyer’s Guide offers 15 points to keep top-of-mind while evaluating solutions and determining the best fit for your organization – read on to get started.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Forcepoint

The Practical Executive’s Guide To Data Loss Prevention
sponsored by Forcepoint
EGUIDE: When implemented successfully, data loss prevention (DLP) controls can have a massively positive impact on the wellbeing of your organization’s sensitive data – however, DLP controls are often an area of confusion. This e-guide aims to clear up confusion surrounding DLP by offering expert insights and tips for success – read on to get started.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Forcepoint

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

GARANCY Password Management
sponsored by Beta Systems
PRODUCT OVERVIEW: Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

AT&T Content Delivery Network (ACDN) - KONA Web Security and Prolexic DDoS Services
sponsored by AT&T Cybersecurity
PRODUCT OVERVIEW: The AT&T CDN with Web Security suite is a bundle of cloud-based web security services designed to help secure your customer’s websites, apps and other assets at the CDN layer. In this product brief, explore its key features and discover how it can help defend against distributed denial of service (DDoS) and other advanced cyberthreats.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

AT&T Cybersecurity
76 - 100 of 1316 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info