Business of Information Technology  >   Business Management  >   Content Management  >  

e-Mail Content Security Management

RSS Feed   
e-Mail Content Security Management Reports
 
Securing Web Applications in Container-Based Environments
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of dynamic security capabilities that can keep pace with the ever-changing nature of DevOps environments leaves organizations exposed to risks. In this white paper, learn about Fortinet's WAF that is designed to protect web-based applications and internet-facing data from threats within container-based environments.
Posted: 14 Feb 2019 | Published: 17 Nov 2018

Fortinet, Inc.

Ten Strategies of a World-Class Security Operations Center
sponsored by Corelight
WEBCAST: The global talent shortage for cybersecurity skills means that the average SOC is a lean group with the enormous task of protecting the organization. Therefore, it's of critical importance to design and operate your SOC to maximize efficiency. In this webcast, learn best practices that can transform a common security team into an elite SOC.
Posted: 28 Jan 2019 | Premiered: May 23, 2018

Corelight

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Build Application Security into the Entire SDLC
sponsored by Micro Focus
WHITE PAPER: 84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.
Posted: 29 Jan 2019 | Published: 31 Aug 2018

Micro Focus

Surrey Satellite Technology Enhances Ground Operations With Real-Time Infrastructure Visibility
sponsored by Splunk Services UK Ltd
CASE STUDY: Surrey Satellite Technology (SSTL) is a provider of operational and commercial satellites. SSTL required a solution that would ensure their engineers and researches had secure access to the IT tool they needed. In order to do this, SSTL implemented Splunk. In this case study, learn about the benefits SSTL saw after deploying Splunk.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

Splunk Services UK Ltd

A Guide to Fraud in the Real World
sponsored by Splunk
: In the digital era, fraud is becoming harder to prevent. Organizations are turning to machine data, which they can analyze to learn vital fraud prevention information. Download this report to learn how Duke University and several other organizations handled a fraudulent attack with machine data analysis.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Splunk

Defending Against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: While Transport Layer Security improves security for web traffic, it comes at a price—increased workload demand and the potential hazards of malware cloaked in encrypted traffic. In this white paper, learn how F5 SSL Orchestrator can help your business drive insight into encrypted traffic.
Posted: 15 Feb 2019 | Published: 30 Sep 2018

F5 Networks

Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
sponsored by Microsoft
PODCAST: Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 03 Nov 2006 | Premiered: Oct 27, 2006, 09:00 EDT (13:00 GMT)

Microsoft

Project Success Plan: Rethinking Enterprise Content Management
sponsored by OpenText
EGUIDE: Traditional ECM can't keep up with how businesses operate today. But before tackling ECM disruptors, you need to understand its evolution and key steps to modernizing your suite. This 7-part guide collection provides the insights you need to push your ECM strategy forward. Learn ECM basics, trends, security considerations, and more.
Posted: 08 Sep 2016 | Published: 31 Aug 2016

OpenText

Mobile Presence and Instant Messaging:  Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 27 Jun 2011 | Published: 23 Jun 2011

Cisco Systems, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement