IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats White Papers (View All Report Types)
 
Exploring the Threat Intelligence Process
sponsored by Recorded Future
WHITE PAPER: This video demonstrates how you can use real-time threat intelligence to sort through data quickly so that you can focus on what matters: threat analysis and detection. Uncover the 3 core steps that go into the threat intelligence process.
Posted: 02 Mar 2017 | Published: 27 Oct 2016

Recorded Future

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Mitigate the Harm a Lack of Security Professionals Can Do
sponsored by Armor
WHITE PAPER: Cybersecurity is a tricky subject in today's threat landscape. Learn how to gain a significant cybersecurity advantage, providing your organization with proactive vulnerability scanning, continuous patching and monitoring, dedicated compliance expertise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race
sponsored by SonicWall
WHITE PAPER: This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond.
Posted: 10 Mar 2017 | Published: 31 Jan 2017

SonicWall

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

How to Prevent Attacks from Ever Breaching You in the First Place
sponsored by Cisco and Dimension Data
WHITE PAPER: Discover how today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection, and why it's now essential to adopt new measures that predictively neutralize these modern threats.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco and Dimension Data

Your Guide to the 2016 Global Threat Intelligence Report
sponsored by Cisco and Dimension Data
WHITE PAPER: Security isn't just beating today's threats: It's a matter of preparing for future threats and mitigating their effects. Dive into this global threat intelligence report and learn how to leverage deep insight into lessons learned from 2016 and 2015, what weaknesses the industry has yet to rectify, what hackers are targeting and where, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco and Dimension Data

Continuous Endpoint Threat Detection and Response in a Point-in-Time World
sponsored by Cisco Systems, Inc.
WHITE PAPER: The only way to defeat today's security threats is to address them holistically across the full attack continuum – before, during, and after an attack. Discover an approach of continuous endpoint analysis in combination with a big data architecture to combat today's malware threat landscape.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Cisco Systems, Inc.

Embrace Risk: Secure Your Hybrid Cloud
sponsored by HPE and Intel®
WHITE PAPER: Learn how to secure your hybrid cloud by treating security as something that should be built into the IT cloud strategy and its design from the very beginning.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

HPE and Intel®

Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement