Hardware  >   Security Hardware  >   Network Security Hardware  >  

Tokens

RSS Feed   
Tokens Reports
 
The Six Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Uncover the 6 essential capabilities of an analytics-driven SIEM. Discover how having these capabilities will allow your enterprise to monitor threats in real time and respond quickly to incidents, minimize risks from insider threats or accidental compromise, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Splunk

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

A Guide to Managing Microsoft BitLocker in the Enterprise
sponsored by WinMagic
WHITE PAPER: Learn how to use BitLocker as a starting point for enterprise device encryption, and where to go from there to achieve full disk encryption for your organization.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

WinMagic

Security risks that can affect your industry
sponsored by SearchSecurity.com
EGUIDE: As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

SearchSecurity.com

Stopping Cyberattacks before they occur: Farsight Security DNS Threat Intelligence - The Red Canary Case Study
sponsored by Farsight Security
CASE STUDY: In this case study learn how Red Canary, a cybersecurity firm, improved Its passive DNS threat intelligence, confirmed and enriched investigative findings, installed a primary and secondary, high fidelity threat indicator, and more.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

Farsight Security

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Tokenization Buyer's Guide
sponsored by Intel
WHITE PAPER: PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
Posted: 12 Sep 2011 | Published: 08 Sep 2011

Intel

3 Steps to Faster EMR Adoption with Desktop Virtualization
sponsored by Imprivata
WHITE PAPER: Inside, uncover a 3-step process that will not only help you accelerate EMR adoption and achieve Meaningful Use but also provides the benefits of two extremely helpful technologies: desktop virtualization and VDI.
Posted: 04 Sep 2013 | Published: 30 Dec 2011

Imprivata

Defend Against New Security Threats to Your Data Center
sponsored by Bayshore Networks
WHITE PAPER: Discover how to defend your enterprise against the security challenges surrounding operational technology (OT) equipment required to support and maintain the modern data center.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement