Security Budgets Reports

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 08 Feb 2021 | Published: 16 Aug 2019

TechTarget ComputerWeekly.com

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

How to Start Building an Enterprise Application Security Program
sponsored by tCell
EGUIDE: In this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
Posted: 20 Mar 2017 | Published: 16 Mar 2017

tCell

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE: This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight