Securing Microsoft Office 365 and Other Azure Applications with Ciphertrust Cloud Key Broker for Azure
sponsored by Arrow & Thales
WHITE PAPER:
Today’s customers expect easy-to-use services, only paying for what they need. However, while they want more of these services, they either can’t or won’t give up control of their data for security reasons. Check out this white paper to see how the CipherTrust Cloud Key Broker for Azure aims to address this issue through key management.
Posted: 01 Mar 2021 | Published: 31 Aug 2020
|
|
|
SecureDoc File Encryption
sponsored by WinMagic
DATA SHEET:
When it comes to protecting sensitive data, full drive encryption sets a strong data protection foundation. But file-level protection adds an additional layer of security, and as such, it’s often recommended as part of a defense-in-depth security strategy. Scan through this data sheet to read up on SecureDoc File Encryption.
Posted: 23 Dec 2020 | Published: 23 Dec 2020
|
|
|
SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 21 Dec 2020 | Published: 21 Dec 2020
|
|
|
Evaluating Data-Centric Protection Solutions
sponsored by Comforte AG
EBOOK:
Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020
|
|
|
Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER:
PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020
|
|
|
One of the World’s Largest Fashion Retailers Chooses Tokenization
sponsored by Comforte AG
CASE STUDY:
A major fashion retailer experienced a data breach when bad actors exploited gaps in their data security program. This prompted decision makers to invest in a more robust data security solution. By viewing this case study, you can learn how this retailer used Comforte’s data protection, encryption, and tokenization to bolster speed and security.
Posted: 04 Dec 2020 | Published: 04 Dec 2020
|
|
|
Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER:
Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020
|
|
|
Overcoming the Challenges of Managing ID Card Issuance
sponsored by HID Global
RESOURCE:
ID card issuance is a complex task. You must ensure the security of data, manage locally-installed software and keep track of printer supply levels. On legacy systems, these processes are only made more difficult. The good news? There’s an innovative ID card issuance program to help you overcome these challenges. Open this infographic for details.
Posted: 01 Sep 2020 | Published: 31 Jul 2020
|
|
|
Cyber security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE:
As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 11 Apr 2017 | Published: 11 Apr 2017
|
|
|
Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE:
Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019
|
|
|
Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE:
Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017
|
|
|
Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE:
In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017
|
|
|
SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE:
Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017
|
|
|
Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE:
In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017
|
|
|
How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE:
Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017
|
|
|
Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE:
Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017
|
|
|
Resolve Web Security Issues with Industry Experts' Advice
sponsored by Veracode, Inc.
EGUIDE:
Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017
|
|
|
How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE:
Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017
|
|
|
Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE:
Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017
|
|
|
Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER:
A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017
|
|
|
Top Mobile Security Threats: Insight Into Threats and Attackers
sponsored by Lookout
EGUIDE:
Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
Posted: 30 Mar 2017 | Published: 28 Mar 2017
|
|
|
Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE:
In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017
|
|
|
Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE:
Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017
|
|
|
Application Development Security Requires Forethought
sponsored by tCell
EGUIDE:
Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017
|
|
|
Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE:
In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017
|
|