Enterprise Security Spending Reports

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018

TechTarget ComputerWeekly.com

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks

MicroScope – November 2023: Team up for peak success
sponsored by MicroScope
EZINE: In this issue, we explore the need to handle pitches and collaboration carefully to create more opportunities as an increasing amount of IT spending goes via partners. Also discover Canalys' predictions for the use of generative AI, and just what exactly it means when we talk 'cyber security'
Posted: 30 Oct 2023 | Published: 03 Nov 2023

MicroScope

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Identity & Access Management Summit 2014
sponsored by Gartner
BROCHURE: This brochure is for the Gartner Summit, occurring March 17th – 18th, 2014, where attendees can gain 2 days' worth of valuable content regarding identity and access management (IAM). Click now to learn about the global IT leaders who will discuss strategic trends that will keep businesses protected for years to come.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Gartner