IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed   
Software Security Threats Reports
 
Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015

Axiomatics

Worldwide Mobile Threat Management Security Software Vendor Assessment
sponsored by Lookout
ANALYST REPORT: The mobile security market is expanding and you need to know how to evaluate the different vendors. This IDC report discusses how you can go about your own evaluation process and breaks down one of the leading vendors as an example.
Posted: 12 Jan 2018 | Published: 29 Sep 2017

Lookout

Governance, Risk, and Compliance: The Business and IT Challenge
sponsored by ServiceNow
RESOURCE: This resource reveals the 6 benefits of the ServiceNow Governance, Risk, and Compliance (GRC) unified platform. Learn how to effectively respond to security risks in real-time through continuous monitoring, prioritization and automation and uncover key use cases.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

The Business Case for Mobile Security
sponsored by Lookout
EBOOK: Mobility is the way of the future, so you need to protect your mobile devices. This e-book chapter presents the case for mobile security and how you can convince the different decision-makers that mobile threats are real and worth the investment to defend against.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Lookout

3 Use Cases for Deception Technology in Financial Services
sponsored by Illusive Networks
WHITE PAPER: This white paper details how a deception solution can help lay the foundation for an active defense program. In addition, uncover 3 use cases for deception technology in financial services, as the industry plays an important role in shaping network and security best practices regarding cybersecurity.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Illusive Networks

Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017

Lookout

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

The Essential Guide to Securing Remote Access
sponsored by Duo Security
WHITE PAPER: New threats center on gaining remote access to your apps and data – whether it's with stolen passwords or exploited known vulnerabilities targeting out-of-date devices. Access this resource to uncover the different threats, using real-world examples, and uncover security best practices to help your organization maintain secure remote access.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

Cloud Service Provider Reduces Impact of Global Denial-of-Service Attacks by Over 90 Percent
sponsored by Juniper Networks
CASE STUDY: In this case study learn how i3D.net, a managed hosting provider based in the Netherlands, reduced the impact of global DoS attacks by over 90% and reduced the amount of trouble tickets lowering service costs.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement