IT Management  >   Systems Operations  >  

System Security

RSS Feed   
System Security Reports
 
Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY: Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017

HackerOne

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

Solution Brief: A Unified-Client Platform for Enterprise-Grade Endpoint Security
sponsored by SonicWall
PRODUCT OVERVIEW: With the growth of ransomware and the persistent use of credential theft, endpoints are the battleground of today's threat landscape. That's why many turn to SonicWall Capture Client for advanced behavior-based malware protection, cloud sandbox file testing, and web threat protection. Download this brief to learn more about the benefits today.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

SonicWall

Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security
sponsored by Proofpoint
CASE STUDY: From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

5 Best Practices for Kubernetes Network Security and Compliance
sponsored by Tigera
WHITE PAPER: As businesses look to modernize their applications, many have turned to Kubernetes because of the benefits containerized workloads bring. However, businesses need to think about securing their applications. In this white paper, explore 5 best practices for securing Kubernetes at the network level.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

Cloud Visibility Report
sponsored by FairWarning
RESEARCH CONTENT: As businesses leverage cloud computing as a central point of business, they have begun looking for security-centric ways to monitor how users are interacting with cloud applications. In this Cloud Visibility Report, learn how other organizations are proactively monitoring their cloud application to gain critical insights into application usage.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

FairWarning

Security Awareness Training Done Right
sponsored by Mimecast
PRODUCT OVERVIEW: Despite the most advanced protections that can be put in place, despite the best threat intelligence that can be brought, organizations remain vulnerable to attacks because of one key factor: human error. In this solution brief, learn how Mimecast Awareness Training can help organizations combat security breaches caused by employee mistakes.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

Telstra security report 2019 – APAC edition
sponsored by Telstra
RESEARCH CONTENT: The latest edition of this Telstra study enables you to benchmark your organization's security posture against other companies in your region. The APAC report also highlights a change in the corporate landscape with the convergence of cyber and electronic security.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Telstra

Quantifying the Operational and Security Results of Switching to Forcepoint NGFW
sponsored by Forcepoint
RESEARCH CONTENT: The distributed nature of many organizations and the changing nature and scale of threats are creating new pressures related to network security. In this IDC study, learn how Forcepoint Next Generation Firewall can serve as a core component of organizations' efforts to protect their networks against common threats.
Posted: 10 Jun 2019 | Published: 31 May 2017

Forcepoint

High-Fidelity Breach Detection with Acalvio Autonomous Deception
sponsored by Acalvio
ANALYST REPORT: ESG Lab validated that Acalvio ShadowPlex is quick and easy to implement at scale. ShadowPlex can deploy hundreds of deception points across numerous network segments and automatically scan your network and make configuration recommendations. Download this ESG lab review to learn more about Acalvio ShadowPlex today.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Acalvio
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement