IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed   
Web Threats Reports
 
Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

Don’t Let Misconfigurations Leave a Hole in Your Firewall
sponsored by FireMon
PRODUCT OVERVIEW: Human error is inevitable in manual processes. In this product overview, discover the 10 misconfigurations that cause data breaches and how FireMon Automation can help to eliminate them.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

FireMon

The ROI of Security Awareness Training
sponsored by Mimecast
WHITE PAPER: When it comes to developing a security strategy to protect your organization’s sensitive data, it’s critical to consider both the people within your environment as well as the technology. In this white paper, review the results of in-depth research recently conducted by Osterman Research and discover the need for security awareness programs.
Posted: 11 Dec 2019 | Published: 31 Aug 2019

Mimecast

Worldwide Security Information and Event Management Market Shares
sponsored by Splunk
ANALYST REPORT: According to IDC, the worldwide SIEM software market grew to $3.0 billion in 2018, a 12.4% increase year-over-year. The growth is a response to an organization's need to monitor, investigate and respond to security threats. Download the report to learn more and see what’s ahead for 2020.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Splunk

Moorabool Shire Council Case Study
sponsored by Mimecast
CASE STUDY: In this case study, discover how Moorabool Shire Council was able to immediately reduce the number of phishing and whaling attacks in order to reduce IT workload while maintaining security for the 250 email users within their municipality.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Mimecast

Driving IT Hygiene with Tanium
sponsored by Tanium
DATA SHEET: Improving IT Hygiene means creating a process to continuously identify assets, risks, and vulnerabilities across an environment and fixing them with speed at scale. In this solution brief, uncover the fundamental aspects of better IT Hygiene and explore Tanium’s IT Hygiene Platform. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Leveraging a Smart Lighting System to Enter a Building Network
sponsored by Forescout
RESOURCE: Although smart lighting systems increase energy efficiency, improve working conditions and optimize space utilization in a building, their connection to the internet provides a potential network entry point for malicious actors. Download this infographic to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Forescout

Claroty Continuous Threat Detection Demo
sponsored by Claroty
WEBCAST: Continuous threat detection (CTD) allows for efficient security with minimal complexity compared to traditional threat detection tools. In this webinar, IT leaders at Claroty discuss the importance of total visibility for data acquisition and provide an in-depth demo of their new dashboard. Continue to watch the demo.
Posted: 18 Nov 2019 | Premiered: Nov 18, 2019

Claroty

Isolation: Separating Malware from the Network, Not Devices
sponsored by Menlo Security
WHITE PAPER: As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Menlo Security

User Lifecycle Management Proves Costly to IT
sponsored by Okta
WHITE PAPER: An IDG survey reveals that manual processes drain productivity and increase security risks. Read on to learn more about the differences between manual versus automated lifecycle management.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement