Software  >   Systems Software  >  

Security Tools

RSS Feed   
Security Tools Reports
 
MicroScope – October 2019: What's next for the channel?
sponsored by MicroScope
EZINE: The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly
Posted: 23 Sep 2019 | Published: 04 Sep 2019

MicroScope

Top 10 Reasons Customers Choose Proofpoint to Protect Office365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Advanced Data Protection for Midsize Enterprises
sponsored by InteliSecure
WHITE PAPER: Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

InteliSecure

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

ComputerWeekly.com

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Buyer’s Guide Digital Identity Verification
sponsored by Mitek Systems, Inc.
WHITE PAPER: Much of today’s customer interaction is done via digital interactions. As this trend continues to grow, organizations need to ensure that they balance customer experience with security. This buyer’s guide provides an overview of current identity verification tools as well as an evaluation workbook to steer you towards an informed decision.
Posted: 20 Jan 2020 | Published: 31 May 2019


Network Security Best Practices
sponsored by Netwrix Corporation
WHITE PAPER: While ensuring the security of your network is a critical task, the amount of tactics and technologies that exist to support this effort can seem overwhelming. This white paper breaks down the basic aspects, tactics, and best practices related to network security in order to help guide your IT security team. Read on to get started.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Netwrix Corporation

Securing DNS: What to Do, and What to be Aware of
sponsored by Cisco Umbrella
EGUIDE: In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info