Security Software Research
-
Managing Information Security Amid New Threats: A Guide for CIOs
Sponsored by: Cisco UmbrellaIn this e-guide discover the fundamentals of a proactive security policy and the challenges that must be overcome when adopting one.
-
Build a Cohesive, Effective Security Strategy
Sponsored by: SplunkDiscover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.
-
Defend your Organization with Advanced SIEM and Privileged Account Controls
Sponsored by: SplunkAs SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
-
Software-Defined Network Security: A 'No-Touch' Approach
Sponsored by: VMwareDespite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.
-
Microsegmentation Strategies for Smarter Security
Sponsored by: VMwareIn this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
-
Buyer's Essentials: What to Look for in Single Sign-On Technology
Sponsored by: TechTarget Health ITAre you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
-
Dispelling the Shadows Cast Over IT Security
Sponsored by: Cisco UmbrellaThis guide discusses two shadows that are being cast over IT security. Domain shadowing, and shadow IT. By learning about these two threats, you'll be better equipped to ensure that you won't face crippling attack down the line.
-
The Evolution of Network Security Hardware
Sponsored by: Aruba NetworksThis e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
-
SOC Analyst in a Box
Sponsored by: TechTarget SecurityDiscover endpoint detection and response (EDR) tools and incident response procedures that will help shorten the time between threat detection and response.
-
Agility in the Data Center
Sponsored by: TechTarget NetworkingThis expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
-
Application Security in the Age of Cloud, BYOD, and SaaS
Sponsored by: BitGlassThis white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
-
Cisco 2015 Annual Security Report
Sponsored by: Cisco Systems, Inc.Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
-
Mobile Cloud Security: What CXOs Need to Know
Sponsored by: Cisco Systems, Inc.This blog post discusses the need for end-to-end security in a mobile cloud environment.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
Sponsored by: IBMFind out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
-
CW Europe – October 2014 Edition
Sponsored by: TechTarget ComputerWeekly.comBYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
-
ROI Case Study: Cloud-Application Security Service
Sponsored by: Veracode, Inc.A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
-
Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
Sponsored by: Veracode, Inc.A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
-
Case Study: How a Global Bank Addressed App Security and Lowered Costs
Sponsored by: Veracode, Inc.A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.
-
Microsoft Office 365: Strengthening Security, Compliance, and Control
Sponsored by: MimecastThis white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
-
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
Sponsored by: OpenText Security SolutionsThis resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
-
Test Data Management for Security and Compliance
Sponsored by: EMC CorporationAs big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
-
Secunia PSI Country Report - Q4 2013 Germany
Sponsored by: SecuniaThis informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.