Software  >   Systems Software  >  

Security Tools

RSS Feed   
Security Tools Reports
 
Peer Insights: Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

MSS | Secure Your Network through the Power of Tata Communications’ Intelligent Analytics
sponsored by TATA Communications
VIDEO: Businesses are in search of ways to protect from threats – but now, they can see them coming. Threat intelligence, predictive analytics for network security, anticipates and mitigates attacks before they hit. With threat intelligence, organizations can defend with data like never before. Watch this brief video to learn more.
Posted: 27 Jul 2020 | Premiered: 24 Feb 2020

TATA Communications

The Enterprise Guide to Cloud Security Essentials
sponsored by Forcepoint
BROCHURE: Like almost any other aspect of business, cloud security is people-driven, which is why it must be people-centric in practice. Download this brochure, The Enterprise Guide to Cloud Security Essentials, to discover how to overcome key cloud concerns achieve security at the people-level.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

Modernizing SOCs with Advanced Threat Intelligence
sponsored by Bitdefender
VIDEO: This webinar provides a comprehensive look at the challenges, threats, and trends as they relate to today’s SOCs, and offers insight into embracing tactical, operational and strategic threat intelligence. Join Jarret Raim and Daniel Clayton, IT security leaders at Bitdefender, as they discuss the need to modernize your SOC.
Posted: 24 Jul 2020 | Premiered: 11 Apr 2019

Bitdefender

SecOps Cybersecurity Best Practice Guide
sponsored by Covestic
RESOURCE: Cybersecurity incidents impact your bottom line. If you need evidence, Equifax’s breach cost them an estimated $4 billion in revenue. On a smaller scale, legal fees of cybersecurity litigation can cost about $2.5 million. The next step in your security journey may cost less than you think. Open this guide for 5 cybersecurity best practices.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Covestic

Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition
sponsored by CyberArk Software, Inc
EBOOK: Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

CyberArk Software, Inc

12 Things You Should Do to Stop Ransomware
sponsored by ThreatLocker
WHITE PAPER: To help organizations address some of the commonly overlooked practices (or lack thereof) that can better detect and mitigate ransomware attacks, ThreatLocker compiled a list of practices that highlights 12 things your organization should be doing to stop ransomware attacks. Download now to unlock these 12 necessary practices.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

ThreatLocker

Incorporate Information Protection into Microsoft Teams from the Start
sponsored by Nucleus Cyber
RESOURCE: Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.
Posted: 06 Aug 2020 | Published: 28 May 2020

Nucleus Cyber

How to prepare for and survive a ransomware attack
sponsored by Bytes Technology Group
WHITE PAPER: In this white paper, unlock expertise regarding preparing for and surviving ransomware attacks by looking at detailed processes and procedures for detecting, isolating, and recovering data infected by ransomware – including proven methods for securing and protecting data.
Posted: 16 Jul 2020 | Published: 30 Apr 2020

Bytes Technology Group

Brother Secures Access and Reduces Costs with Cloud-based Authentication
sponsored by Thales
CASE STUDY: In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info