IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed   
Threats Reports
 
Unified Endpoint Management (UEM)
sponsored by BlackBerry
EBOOK: Today’s endpoints are widely distributed, unique and, most of all, vulnerable. The evolution of the endpoint requires an evolution in endpoint management to match, and that’s where Unified Endpoint Management (UEM) comes in. Dive into this e-book and learn 5 reasons why you should take a closer look at UEM, as well as its ties to zero trust.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

BlackBerry

Remote Work Is the Future
sponsored by BlackBerry
CASE STUDY: Remote work is quickly becoming a new reality for the foreseeable future. In this case study, discover what led ConvergeOne, a professional and managed services provider in North America, to partner with BlackBerry and explore the outcomes of their remote work project.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

BlackBerry

Return to Work Safely
sponsored by BlackBerry
WHITE PAPER: This white paper provides an in-depth look at BlackBerry AtHoc, a crisis incident communications platform designed to help organizations communicate, collaborate and react decisively to any incident, event or emergency situation
Posted: 20 Oct 2020 | Published: 20 Oct 2020

BlackBerry

The Complete Guide for Preventing Costly Data Leaks for UK Local Governments
sponsored by Zivver
EGUIDE: For local governments in the UK, a data leak can be catastrophic, not to mention expensive. This guide provides a deep dive into the risks that lead to data leaks and what UK councils can do to prevent them from happening.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Zivver

Operational Cost, Security-Related Risk: Quantifying The Value Of Network Security Policy Management
sponsored by FireMon
ANALYST REPORT: Manual management of network security policies, rules and configurations is time-consuming and error-prone, and it adds both operational cost and increases security-related risks — especially as your IT infrastructure grows more complex. Read this analysis quantifying the value of a policy management solution.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

FireMon

PKI Offers Better Identity Security Than Typical MFA Solutions
sponsored by Sectigo
RESOURCE: Identity is the new perimeter – how can you best protect the identities of your people, devices, and data? MFA can be effective, but it still leaves vulnerabilities that you must account for. View this infographic to learn why public key infrastructure may provide more robust security than typical MFA.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo

ERM & GRC: Digital Tools for Oversight In The Enterprise
sponsored by ServiceNow
WHITE PAPER: In this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

ServiceNow

Aruba 360 Secure Fabric
sponsored by TechData
DATA SHEET: Today, a number of technology disruptions – mobile, BYOD, virtualization, cloud, big data, and IoT – have rendered a perimeter-based security approach insufficient. Modern threat defense requires constant assessment of device risk with analytics-ready secure infrastructure. View this data sheet to learn about Aruba 360 Secure Fabric.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

TechData

How to Consolidate Your Cybersecurity Stack
sponsored by Dell SecureWorks
WHITE PAPER: As a result of rapid innovation by threat actors in the past decade, the number of layers in the average cybersecurity stack is now up to 47. This number wouldn’t seem so horrible if these tools worked well together, but they don’t. It may be time to consolidate your cybersecurity. Read this white paper to learn the framework for doing so.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Dell SecureWorks

The New Reality
sponsored by BlackBerry
WHITE PAPER: Although issues related to protecting and managing endpoints existed long before COVID-19, the recent pandemic put a spotlight on these issues. In order to address these challenges, organizations are opting for unified endpoint security solutions – read on for an in-depth look at what that entails and why it’s gaining popularity.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info