Security Infrastructure Research
-
How to Approach Storage Disaster Recovery
Sponsored by: RubrikIn this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
-
Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
Sponsored by: Trend Micro, Inc.In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
-
Testing the Cloud: Ensuring Enterprise Data is Secure
Sponsored by: Trend Micro, Inc.In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
-
Managing Information Security Amid New Threats: A Guide for CIOs
Sponsored by: Cisco UmbrellaIn this e-guide discover the fundamentals of a proactive security policy and the challenges that must be overcome when adopting one.
-
Build a Cohesive, Effective Security Strategy
Sponsored by: SplunkDiscover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.
-
Defend your Organization with Advanced SIEM and Privileged Account Controls
Sponsored by: SplunkAs SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
-
Firewalls Revamping Your Policy and Dynamics
Sponsored by: Barracuda NetworksIn this e-guide, discover not only how to add the capabilities of next-gen firewalls to your security portfolio, but also the options an enterprise needs for their management. Uncover 3 management considerations to build out your firewall strategy.
-
Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security
Sponsored by: OptumIn this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.
-
BYOD: Keeping the Benefits While Staying Secure
Sponsored by: IBMIn this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
-
See Why Network Monitoring Tools are Critical in today's Hyperconnected World
Sponsored by: eTECH ChannelThis e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.
-
How to guard secure data
Sponsored by: OptumIT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
-
How to Craft SSO and IAM Strategies on the Cloud
Sponsored by: OneLoginIdentity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.
-
Office 365: Cloud Data Security Considerations to Explore Before Adopting
Sponsored by: ProofpointIT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
-
DLP Tools Essential to Data Protection Strategy
Sponsored by: Intel SecurityNetwork-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
-
Six Steps to Buying Data Loss Prevention Products
Sponsored by: Intel SecurityData loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
-
Buyer's Essentials: What to Look for in Single Sign-On Technology
Sponsored by: TechTarget Health ITAre you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
-
An Introduction to Microsoft Office 365 and Email Security Tools
Sponsored by: Solarwinds MSPIn this e-guide, expert Dave Shackleford discusses the security pros and cons of Microsoft Office 365's cloud-based productivity suite. You'll also find a section on email security, including helpful information about choosing between on-premise email security tools, or embracing the cloud.
-
What to Look for in Multifactor Authentication Tools
Sponsored by: TechTarget SecurityIn our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
-
How can proper BYOD and IoT device onboarding improve
Sponsored by: RUCKUS NetworksThis e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.
-
The IT Security Manager's Guide to Incident Response & Shadow IT
Sponsored by: Cisco UmbrellaThis expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.
-
Dispelling the Shadows Cast Over IT Security
Sponsored by: Cisco UmbrellaThis guide discusses two shadows that are being cast over IT security. Domain shadowing, and shadow IT. By learning about these two threats, you'll be better equipped to ensure that you won't face crippling attack down the line.
-
The Evolution of Network Security Hardware
Sponsored by: Aruba NetworksThis e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
-
Deeper Threats Call for Advanced Threat Detection
Sponsored by: Solarwinds MSPAccess this e-guide and discover the necessity of having multiple layers of security and employing multiple technologies in the process. Antivirus technologies are fine for a first measure, but finding advanced threats requires deeper network scans.
-
The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
Sponsored by: UnitedLexCyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
-
Advanced Persistent Threat Detection: Can It Find Custom Malware?
Sponsored by: UnitedLexA recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.