Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blockers

RSS Feed    Add to Google    Add to My Yahoo!
Ad Blockers White Papers (View All Report Types)
 
Oh #@$%! I've Been Breached: What to do Next
sponsored by Armor
WHITE PAPER: Learn how to not only put together an incident response plan (IRP), but what to do during and afterwards to reduce downtime and smoothly transition back to normal operations as quickly as possible.
Posted: 22 Dec 2016 | Published: 22 Dec 2016

Armor

Survey Findings: Data Security
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

How To Build a High-Performance Sales Organization
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Only 58% of sales reps actually meet their quotas. Are the other reps just underperforming, or are expectations too high? Access this white paper to explore sales performance management software strategies and best practices to improve your sales team's performance.
Posted: 10 Nov 2016 | Published: 31 Dec 2015

Oracle Corporation UK Ltd

Maximize Performance and Mitigate Risks with PHP 7
sponsored by Rogue Wave Software
WHITE PAPER: This white paper examines PHP, a tried and true platform for business-critical apps that has driven web and mobile growth for a number of years. Access now to learn more about the release of PHP 7, which introduces new language constructs and significantly enhanced performance, and uncover insightful tips on how to optimize your use of PHP.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Rogue Wave Software

Five Tactics to Stop Email Attacks
sponsored by Mimecast North America
WHITE PAPER: Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Applied Behavior Analytics: Don't Be an Outlier!
sponsored by Distil Networks
WHITE PAPER: In this 451 Research report excerpt, explore the implications of applied behavior analytics (ABA) on today's security landscape. Learn about the ABA market, the different types of behavior analytics, insider monitoring systems and more. Plus, get recommendations on how you can proceed with ABA.
Posted: 30 Aug 2016 | Published: 30 Jun 2016

Distil Networks

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 14 Jan 2017 | Published: 14 Jan 2017

Mimecast

Cisco Leads Again in NSS Breach Detection Test
sponsored by Cisco
WHITE PAPER: Learn how to reduce time to detection and increase detection rate. Read on to learn how to reduce the space and time attackers have to harm your organization.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement