IT Management  >   Systems Operations  >   Security  >  


RSS Feed   
Threats Reports
How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software

Bridging the Gap Between Active Directory and the Cloud
sponsored by Okta
WHITE PAPER: In this white paper, learn how you can integrate your legacy AD environment with modern SSO from Okta and the Okta Identity Cloud.
Posted: 25 Mar 2020 | Published: 25 Mar 2020


Microsoft 365 Business Premium Secures Your Devices
sponsored by TechData - Microsoft
VIDEO: In this short and comical video, learn how Microsoft Office 365 can help secure all your devices.
Posted: 03 Apr 2020 | Premiered: 03 Apr 2020

TechData - Microsoft

2020 Cloud Misconfigurations Report
sponsored by DivvyCloud
WHITE PAPER: Across 2018 and 2019, data breaches caused by cloud misconfiguration resulted in the exposure of over 33 billion records, which led to a loss of nearly $5 trillion. In this report, explore the underlying causes of this threat and discover best practices for avoiding a misconfiguration-related incident.
Posted: 08 Apr 2020 | Published: 08 Apr 2020


Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

How Microsoft 365 Business Premium Protects Your Data
sponsored by TechData - Microsoft
VIDEO: Monitoring your network for potential risks is a lot like managing a large dam – one small leak can lead to a catastrophic breach. In this video, explore the capabilities of Microsoft Office 365 Business Premium, and discover if this is the right email security tool for your needs.
Posted: 02 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

Ultimate Guide to Multi-factor Authentication
sponsored by Ping Identity Corporation
EGUIDE: When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation

Cloud Visibility Report
sponsored by FairWarning
WHITE PAPER: According to the International Data Corporation, cloud-based spending is expected to reach $500 billion by 2023. As environments adopt more cloud technologies, they become more complex and difficult to monitor. Read this white paper to uncover tips and best practices for organizations considering building their own cloud monitoring program.
Posted: 09 Apr 2020 | Published: 09 Apr 2020


Cloud Enabled Threats Guide
sponsored by Netskope
WHITE PAPER: The cyber kill chain has migrated to the cloud. Do you understand the new security threats well enough to take the right protective measures? Read the report that exposes the latest cloud-enabled threats and explains why they elude traditional defenses.
Posted: 09 Apr 2020 | Published: 09 Apr 2020


Ensuring Cloud Security and Compliance in the Financial Services Industry
sponsored by DivvyCloud
WHITE PAPER: In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.
Posted: 06 Apr 2020 | Published: 06 Apr 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info