IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed   
Threats Reports
 
Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security
sponsored by Proofpoint
CASE STUDY: From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY: Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

The State of Email Security Report 2019
sponsored by Mimecast
RESEARCH CONTENT: Email is the largest single attack vector and there are many risks your organization faces when trying to defend against the daily scourge of threats. In this white paper, explore key statistics from Mimecast's 3rd annual State of Email Security Report which can help you shape your email security plan.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Mimecast

The ASD Essential 8 and Ivanti
sponsored by Ivanti ANZ
WHITE PAPER: Implementing the ASD Essential 8 effectively helps you achieve a baseline for your cybersecurity strategy. While this sounds straightforward, many companies still struggle to achieve this level of security today. In this white paper, learn about the importance of each control that makes up the Essential 8.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

Secureworks Red Cloak Threat Detection and Response Application
sponsored by Dell SecureWorks
RESEARCH CONTENT: Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, and compromise IT assets. This is where threat detection and response come into play. The tools used for these tasks are referred to as security analytics and operations. In this research report, explore the state of the security analytics and operations market.
Posted: 21 May 2019 | Published: 31 May 2019

Dell SecureWorks

CloudCheckr is the Engine Driving Cloud Governance at Siemens
sponsored by Cloudcheckr
CASE STUDY: Railigent monitors the physical infrastructure required to keep rail transportation reliable and safe, but turned to CloudCheckr to ensure the cloud infrastructure it relies on is just as secure. In this case study, learn how CloudCheckr has streamlined Railigent's security protocols to ensure developers can easily identify security issues.
Posted: 17 Jun 2019 | Published: 07 May 2019

Cloudcheckr

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware and Intel
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the eBook to learn how to reduce the attack surface and simplify security.
Posted: 23 May 2019 | Published: 31 Aug 2018

VMware and Intel

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019

VMware

The Insider Threat: Real Defense for Real Businesses
sponsored by Proofpoint
WEBCAST: How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, Kate Burnell, Global Insider Threat Specialist at Dtex Systems and Kurt Wescoe, Chief Architect at Wombat Security discuss how cybersecurity professionals can address the insider threat without shutting down business.
Posted: 30 May 2019 | Premiered: Nov 30, 2018

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement