Searching all of TechTarget| 12,236 results for "thirdparty"


By Michael Cobb Evaluate Jul 23, 2015

Third-party risk management: Avoid the dangers of weak controls

If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. Continue Reading


By Beth Pariseau News May 08, 2015

AWS cloud management smoothed by third-party tool

An AWS shop turned to a product from an AWS premier partner to collect, correlate and manage the data produced by native Amazon tools. Continue Reading


By Karl Flinders Apr 24, 2015

Goldman Sachs invests in more third-party IT

After its $15m investment in startup Kensho, Goldman Sachs has invested $20m in high-frequency trading firm Perseus Continue Reading


By Basit Farooq Evaluate Jul 01, 2015

Top three third-party SQL Server security auditing tools

For most companies, SQL Server's security auditing tools aren't always enough to meet regulation requirements. The answer is third-party products. Continue Reading


By Kevin Beaver Evaluate Jun 30, 2015

Do you need third-party email security tools?

Think you have a grip on email security? Ask these nine questions to determine if native security tools are enough or if you need a third-party tool. Continue Reading


By Maxim Tamarov News Apr 10, 2015

Chrome security under fire from third-party extension

Security researchers say Webpage Screenshot, a popular third-party extension for Google Chrome, was secretly collecting end-user browsing data. Its true purpose and how Google missed it remain up for debate. Continue Reading


By Bryan Barringer Evaluate Mar 30, 2015

What's the best way to acquire third-party applications?

Only some organizations have the means to develop in-house mobile applications, so IT often has to make the most of the third-party options available. Continue Reading


By David Strom Evaluate Mar 23, 2015


By Dave Shackleford Evaluate May 19, 2015

Comparing third-party vs. cloud providers' Web security scanners

Google Cloud Platform has its own Web application security scanner, but are in-house scanners better than third-party scanners? Expert Dave Shackleford examines. Continue Reading


By Alyssa Wood News May 14, 2015

ShareFile steps up security with third-party DLP integration

Citrix ShareFile will allow for third-party DLP integration within its data zones, as IT shops look for a balance between ease of use and security. Continue Reading