Search Results for: security

CIO Trends #8
In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

TechTarget ComputerWeekly.com

How revenue cycle management's security requirements are evolving
The recent cybersecurity attack on Change Healthcare has revenue cycle management vendors and clients prioritizing security and system changes.

XtelligentMedia Healthcare

How security requirements for revenue cycle management are changing
The recent cybersecurity attack on Change Healthcare has revenue cycle management vendors and clients prioritizing security and system changes.

XtelligentMedia Healthcare

5 Critical Security Callouts to Know in 2024
Cisco conducted a survey and compiled the results in their 2024 Duo Trusted Access Report, which evaluates the new frontier for access management and identity security. Gain an understanding of the top 5 most important takeaways from the report in this infographic.

Cisco

MicroScope – March-April 2024: Is cloud the best option?
In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year

MicroScope

Infographic: 5 essential open source cybersecurity tools for 2022
There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.

TechTarget ComputerWeekly.com

MicroScope – April 2023: The benefits of security accreditations
In this month's MicroScope ezine, we look at how industry-recognised certifications can strengthen business defences. We also see how ChatGPT offers the channel a chance to level the playing field. Read the issue now.

MicroScope

6 user authentication types to secure networks
The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.

TechTarget ComputerWeekly.com

Simplify Cloud Security with Red Hat and AWS
Secure your hybrid cloud with consistent security policies across Red Hat Enterprise Linux and AWS. Learn how to mitigate risks, implement layered security, and streamline compliance. Download this product overview to discover the integrated security capabilities.

Red Hat

Pascoalotto Depends On Check Point For Scalable Security
Paschoalotto, a leading Brazilian call center, needed a scalable security solution to meet strict requirements. They chose Check Point's Quantum Maestro Orchestrator, Security Gateways, and R80 Security Management, which provided scalability, cloud integration, and unified visibility, enabling secure services. Read the case study to learn more.

Checkpoint Software Technologies