Search Results for: security

Zero Trust: Building blocks, evolution & more
Between growing sophisticated cyberattacks and widening IT skills gaps, complex obstacles dot the journey to strong network security. To find out how adopting a Zero Trust approach can level up your organization’s network-security posture, tune into this webcast featuring 4 leaders from Portnox.

TOPICS: .NET
Portnox

Change Intelligence Research Series Risks And Vulnerabilities In Salesforce Permission Management
Analyzing over 600,000 Salesforce permissions, this report uncovers complex access that heightens security risks and administrative load. It underscores the shift to a permission set-led model for simpler management and better security. Discover mitigation strategies and streamlining tips in the full report.

Elements.Cloud

Decathlon Expands Global Digital Leadership and Presence With Trusted Partner
Decathlon faced an uphill battle when it came to implementing the security side of their company-wide digital expansion. Through an implementation of Trend Micro’s suite of security products, Decathlon is able to aggressively pursue its digital vision with confidence. Read on to learn the full story.

TOPICS: .NET
Trend Micro

Attacker Economics
Threat actors target privileged access to infiltrate systems, exfiltrate data, and disrupt operations. This infographic outlines the attacker economics behind these tactics and how an identity-first security strategy can improve cyber resilience. Read the full infographic to assess your identity security posture.

SailPoint Technologies

Next-Gen Cybersecurity: How to Automate Suspicious & Malicious File Analysis in SentinelOne
As the volume and complexity of malware grows, security teams struggle with alert fatigue and false positives. Automate the malware analysis process with SentinelOne and CodeHunter to enhance threat detection, improve response time, and streamline security operations. Read the e-book to learn more.

CODEHUNTER

Aviatrix Systems Video 2
How can you simplify the security of your cloud applications while reducing costs? Watch this webcast, which features leaders from Aviatrix, to find out.

TOPICS: .NET
Aviatrix Systems

Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders
In this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.

TechTarget ComputerWeekly.com

You’re Under SIP Attack: Limiting SIP Vulnerabilities
Without the necessary expertise, monitoring, and management, companies could be leaving their network vulnerable to exploitation through their VoIP communications. Read this white paper to understand hackers’ tactics and motivations to help your enterprise operators secure their networks from attack.

TOPICS: .NET
Ribbon Communications

Omdia Universe: Digital Workspace Management / Unified Endpoint Management Platforms, 2024
Digital workspace management platforms are crucial for businesses to enable and secure a more mobile workforce. This Omdia report explores the evolving capabilities of these solutions, including endpoint management, mobile security, and digital experience. Read the report to learn how these platforms can support your hybrid work strategies.

JAMF

A-core Fortifies Cybersecurity
After a close call with a ransomware attack, A-Core Concrete Specialists’ IT team decided they needed a more prepared and mature endpoint and email security operation. By partnering with Bitdefender, A-Core were able to combine several of their offerings and create a more secure operation while saving time and energy. Read on to learn more.

TOPICS: .NET
Bitdefender