Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed   
Wireless Encryption Reports
 
Securing Financial Data from Within
sponsored by Trustwave
CASE STUDY: In this case study, discover how a global accounting firm was able equip their IT staff with a point-and-shoot security program that enabled them to audit user access, address misconfigurations and other vulnerabilities. Read on to see the full story.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Trustwave

The 4 Levels of Automated Remediation
sponsored by DivvyCloud
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Transparent Data Movement Solution Overview
sponsored by RackTop Systems
DATA SHEET: Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Alero Showcase
sponsored by CyberArk Software, Inc
VIDEO: In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

The Move to Multiple Public Clouds Creates Security Silos
sponsored by Radware
WHITE PAPER: The migration of data to the cloud appears to be a trend that isn’t slowing down. Luckily for security teams, ensuring the protection of this critical data has come a long way. This report highlights the key findings of a study designed to further understand the impact of cloud migration on cybersecurity. Read on to unlock the results.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

Protecting a Nation in the Cloud
sponsored by Trustwave
CASE STUDY: In this case study, see how a major government sub-agency partnered with Trustwave to address challenges they were having with securing sensitive data across multiple cloud vendors. Read on to follow the journey of their partnership.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

Splunk Security: Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware is, unfortunately, an increasingly frequent and costly attack method. It’s a subset of malware that steals data and holds it ‘hostage’ until a ransom is paid. In this white paper, learn about detecting the early signs of compromise or malicious activity by following this step-by-step journey. Read on to get started.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Splunk

Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

Securely Manage 3rd Party Remote Access to CyberArk
sponsored by Cyber-Ark Software
WEBCAST: Third-party vendor access is a critical component to most business operations today. However, this presents a new vulnerability that cybercriminals look to expose. In this webinar, take a closer look at notable breaches and challenges with existing third-party access security options. Continue to watch the webinar.
Posted: 23 Mar 2020 | Premiered: Mar 23, 2020

Cyber-Ark Software

How to Budget for Managed Detection and Response: A 6-step Guide for IT Security
sponsored by CI Security
WHITE PAPER: As a security leader, one of the biggest challenges is acquiring adequate security tools while staying under budget. Too often, sacrifices are made, leading to potential security gaps. This guide highlights 6 steps you should take when crafting a budget proposal for acquiring a managed detection & response tool Read on to get started.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

CI Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info