IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

ComputerWeekly.com

What You Need to Know to Combat the Insider Threat
sponsored by Dell SecureWorks
WHITE PAPER: In this white paper, you will learn to better understand the potential damage an insider threat can cause an organization and appropriate identification techniques to help you mitigate the risk they pose to an organization.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Dell SecureWorks

Access Management Handbook
sponsored by Thales
EBOOK: The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.
Posted: 23 Mar 2020 | Published: 30 Sep 2019

Thales

2020 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: This 2020 Global Threat Report from CrowdStrike covers real-world scenarios and observed trends in attackers’ ever-evolving tactics, techniques and procedures, and offers practical recommendations to protect your organization in the coming year.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

CrowdStrike

5 Essential Elements of a Comprehensive Endpoint Security Strategy
sponsored by Cyber-Ark Software
WHITE PAPER: Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

Remote Vendor Access
sponsored by CyberArk Software, Inc
WHITE PAPER: Today’s organizations are heavily reliant on third-party vendors accessing their critical infrastructures. However, this presents an attractive target for hackers. In this white paper, discover how the CyberArk Alero architecture could help you achieve security without the need for VPNs or passwords. Read on to learn more.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc

Encrypt Everything
sponsored by Thales
EBOOK: Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security. Read on to learn more.
Posted: 26 Mar 2020 | Published: 30 Nov 2019

Thales

The Top 7 Phone Verification Challenges & How to Overcome Them
sponsored by Vonage
WHITE PAPER: No consumer wants to be the victim of fraud or the recipient of unwelcome spam, and no app or service provider wants to unwittingly harbor spammers or fraudsters. In this e-book, learn how to increase conversion rates and onboard users at global scale with phone verification.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Vonage

Protecting a Nation in the Cloud
sponsored by Trustwave
CASE STUDY: In this case study, see how a major government sub-agency partnered with Trustwave to address challenges they were having with securing sensitive data across multiple cloud vendors. Read on to follow the journey of their partnership.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

How Can Trend Micro XDR Solve Your Detection and Response Challenges
sponsored by Trend Micro
RESOURCE: In the last 5 years, there’s been a 67% increase in security breaches. Disconnected security layers make analyzing and investigating threats a challenge. Additionally, slow and inadequate response increases the impact of the attack. In this infographic, learn how Trend Micro XDR can help solve your detection and response challenges.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Trend Micro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info