IT Management  >   Systems Operations  >  

System Security

RSS Feed   
System Security Reports
 
Evolving DevOps to support security – perspectives from the Puppet Labs State of DevOps report
sponsored by ServiceNow
WHITE PAPER: In this State of DevOps report, explore recent research findings from Puppet Labs and ServiceNow as they home in on DevOps trends with an emphasis on security. Read the key takeaways here.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

ServiceNow

Infogix Uses Clumio on AWS to Automate Backups and Reduce Storage Costs
sponsored by Clumio
EBOOK: From operations to sales, from product and customer service to marketing, users across the entire organization can use Infogix software to remove barriers to data access, accelerate time to-insight, and increase operational efficiency.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Clumio

KVC Health Systems Eliminates Email Security Incidents with Vade Secure
sponsored by Vade Secure
CASE STUDY: In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


2020 SANS Cyber Threat Intelligence (CTI) Survey
sponsored by ThreatQuotient
WHITE PAPER: In order to understand the risks that threaten their sensitive data, organizations are embracing cyber threat intelligence (CTI) programs. But how effective are current CTI programs? This research report provides a comprehensive look at the results of the 2020 SANS Cyber Threat Intelligence (CTI) Survey – read on to get started.
Posted: 17 Sep 2020 | Published: 29 Feb 2020

ThreatQuotient

Measuring the ROI of an Incident Response Platform
sponsored by Palo Alto Networks
WHITE PAPER: A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

Palo Alto Networks

How to Spot a Spear Phishing Email
sponsored by Vade Secure
RESOURCE: The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


Worldwide Hybrid Cloud Workload Security Market Shares
sponsored by Trend Micro
ANALYST REPORT: This IDC study presents the worldwide hybrid cloud workload security market shares for 2019 (updated in June 2020.) Download the report to uncover the leaders and those who own the rest of the market.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Trend Micro

Seven Must-Have Endpoint Management Capabilities
sponsored by HCL Software
DATA SHEET: When endpoint management systems are effectively integrated with security and IT operations tools, they play a major role in proving compliance, stopping threats, consolidating tools, and protecting brands. Read the study to learn the Seven Must-have Endpoint Management Capabilities.
Posted: 08 Sep 2020 | Published: 30 Sep 2019

HCL Software

Protect Your Sensitive Data
sponsored by Thales
EGUIDE: When it comes to integrating a data protection solution, there are several considerations organizations need to understand prior to choosing a partner, namely – are you looking to protect data at rest, data in motion or both? Read on to unlock a step-by-step guide to finding the right data protection solution for your organization.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Thales

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info