IT Management  >   Systems Operations  >  

System Security

RSS Feed   
System Security Reports
Mitigating IP Risk: Three Strategies to Ensure Open Source Compliance
sponsored by Fossa
WHITE PAPER: As open source software continues to be adopted at an increasing rate, compliance with open source licenses becomes a more pressing initiative. Download this white paper for 3 strategies you can use to ensure open source compliance.
Posted: 31 Jan 2020 | Published: 31 Jan 2020


Absolute Maximizes Klein Independent School District One-to-One Program
sponsored by Absolute Software Corporation
CASE STUDY: Learn how Absolute allowed the Klein Independent School District (ISD), of Texas to deploy a successful one-to-one computing program with student device security and privacy.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Absolute Software Corporation

Ransomware Can’t Stop the Presses at La Sentinelle
sponsored by Malwarebytes
CASE STUDY: In this case study, La Sentinelle, a media group in Mauritius, sought to eliminate downtime associated with ransomware in the wake of a disruptive malware attack. Download this white paper to learn how they developed a program that would enable them to identify, mitigate, and prevent malware attacks.
Posted: 12 Feb 2020 | Published: 12 Feb 2020


Strategies to Vet Your Threat Intelligence and Reduce False Positives
sponsored by DomainTools
WHITE PAPER: This paper discusses detection strategies to reduce false positives, and models that improve threat hunting and investigations outcomes. Also uncover leading tools that help teams make the most of their limited time and resources.
Posted: 30 Jan 2020 | Published: 30 Jan 2020


SAP Compliance Risk Dashboard Appsian Real-Time Analytics
sponsored by Appsian
DATA SHEET: Compliance mandates such as SOX, GDPR, CCPA and others require organizations to maintain details of data access. View this data sheet to see how Appsian’s Compliance Risk Analytics dashboard equips SAP customers with direct, real-time visibility into the activity around high-risk business transactions.
Posted: 27 Feb 2020 | Published: 27 Feb 2020


Biometric Authentication Key to Remote Access for Vendors
sponsored by CyberArk Software, Inc
RESOURCE: Biometric authentication can’t be stolen, lost in transit, forgotten or figured out. That’s why, organizations using the Zero-Trust security model often choose biometric authentication to verify their remote vendors. Learn how you can provide the right access to remote vendors when combining biometric authentication with a strong backend solution.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

CyberArk Software, Inc

The Sprawling Reach of Complex Threats
sponsored by Trend Micro
WHITE PAPER: Download Trend Micro’s latest annual security roundup for a deep dive into the most important issues that shaped the threat landscape of 2019. Learn how you can protect your organization from threats such as ransomware, supply chain attacks, and more.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Trend Micro

Gartner: Top 10 strategic technology trends in 2020
sponsored by
EGUIDE: Two decades ago, at the start of the millennium, IT was deeply concerned about Y2K – and the iPhone, Twitter and Facebook didn't exist. So what's in store as a new decade begins?
Posted: 21 Feb 2020 | Published: 21 Feb 2020

A Record-Breaking Year for Ransomware
sponsored by Panda Security
WHITE PAPER: From government agencies to international corporations, from the United States to Europe and beyond, it seemed like nothing was safe from ransomware in 2019. In this white paper, learn about the biggest attacks of the year, how companies bounced back from them, and how you can stay protected in 2020.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Panda Security

Product Guide: D3 SOAR
sponsored by D3 Security
DATA SHEET: D3 SOAR is an enterprise-grade security operations platform that can help organizations utilize their resources to shut down threats before they cause serious damage. Download this product guide to learn all about their 200+ security integrations, codeless automation, and fully embedded MITRE ATT&CK correlations.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

D3 Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info