IT Management  >   Systems Operations  >  

System Security

RSS Feed   
System Security Reports
 
Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

Beginner's Guide to Employee Monitoring
sponsored by ActivTrak
WHITE PAPER: On the surface, employee monitoring systems might seem like a fancy way to babysit employees. However, this technology stands as a far more valuable tool than people give it credit for. In this white paper, learn about several security benefits of employee monitoring systems.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

ActivTrak

Your Cybersecurity Tech Stack Creating More Gaps
sponsored by Optiv
RESOURCE: It’s a common misconception that more tech services mean more security, but the reality is quite the opposite. In fact, a Cisco cybersecurity report reveals a correlation between the number of security vendors and the number of breaches. In this infographic, dive deeper into this issue and explore ways to close the gap.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Optiv

Are Bots Killing Your Business Intelligence?
sponsored by F5 Networks
WHITE PAPER: While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

Dutch organisations demand more from government
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

ComputerWeekly.com

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Choice Solutions MSSP Case Study
sponsored by Siemplify
CASE STUDY: In this case study, explore how Choice Solutions partnered with Siemplify to implement a security platform that enabled them to automate 98% of their tasks, allowing their team of analysts to focus their time and effort on more complex tasks by working within a single console.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Siemplify

Rethinking Enterprise Data Defense
sponsored by FireMon
EBOOK: Despite heavy investment of time and resources, the number of cybersecurity breaches and incidents continues to increase each year. In this e-book discover how to rethink your enterprise security strategy and explore proactive defense tactics.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

FireMon

APIs, digital transformation and the need for a new approach to security
sponsored by Arxan
WEBCAST: Today, most organizations don’t know how many APIs they’ve deployed, let alone if they’re secure. According to recent threat analyses, API exploits are predicted to be the most frequent attack vector in the next two years. Learn how to protect API access from the outside in with this Arxan webinar now.
Posted: 05 Dec 2019 | Premiered: Dec 5, 2019

TOPICS:  Security
Arxan

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER: The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PortSys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement