Security Audits Research
-
Comparing Top Shelf Email Encryption Software Products
Sponsored by: Hewlett Packard EnterpriseAccess this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: ModoModoA major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
-
Top Mobile Security Threats: Insight Into Threats and Attackers
Sponsored by: LookoutDiscover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: Cisco Umbrella and Dimension DataIn this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
-
7 Elements of Cybersecurity Readiness
Sponsored by: Cisco Umbrella and Dimension DataDiscover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
-
Building an Application Security Program: Why Education is Key
Sponsored by: tCellGain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
-
Application Development Security Requires Forethought
Sponsored by: tCellLearn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
-
How to Start Building an Enterprise Application Security Program
Sponsored by: tCellIn this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
-
How To Limit Privileged Accounts And Boost Security
Sponsored by: DevolutionsToo many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
-
Security Rating Scores for Third-Party Vendors Catching On
Sponsored by: BitSightIn this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
-
Go Beyond Just Securing Your Cloud, Make it Better
Sponsored by: McAfee, Inc.Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
-
What to Look for in Secure Sockets Layer
Sponsored by: TechTarget SecurityThis Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
-
Get the Message: Why Secure Texting in Healthcare Matters
Sponsored by: TechTarget Health ITTexting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
Insider Edition: There's No Room for Either/Or When It Comes to Cloud and Security
Sponsored by: TechTarget SecurityImproved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
-
Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
Sponsored by: Symantec CorporationView this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
-
Data Privacy: Where Should I House My Data?
Sponsored by: IntraLinks, IncThis white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
HIPAA Violations Incur Multi-Million Dollar Penalties
Sponsored by: AbsoluteIn this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
-
Proactive data security, audit and compliance solutions
Sponsored by: IBMAccess this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
PCI DSS Simplified: What You Need to Know
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
-
Netwrix Auditor Enterprise Edition
Sponsored by: Netwrix CorporationWhen diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
-
Keep Cloud Compliant
Sponsored by: TechTarget SecurityAccess this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
-
Okta Active Directory Integration - An Architecture Overview
Sponsored by: OktaThis white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.