IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security ThreatsWhite Papers (View All Report Types)
 
Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper lists 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches.
Posted: 16 Apr 2014 | Published: 30 Dec 2011

Qualys

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource highlights a pervasive, network-based security solution that improves data protection across critical Web business tools against a more advanced threat landscape.
Posted: 22 Apr 2014 | Published: 31 May 2013

Cisco Systems, Inc.

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Fortinet, Inc.

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

The Big Data Security Analytics Era is Here
sponsored by EMC Corporation
WHITE PAPER: Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Posted: 11 Apr 2014 | Published: 31 Jan 2014

EMC Corporation

The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

LogRhythm, Inc.

The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER: Access this resource to discover the benefits of cloud-based security, especially for small and medium-sized businesses (SMBs) who have fewer resources when mitigating increasing risks and compliance mandates.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Qualys

Fortify Your App
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper to learn the biggest mobile application security shortfalls. Click now to uncover 3 steps to take to help you boost your defenses.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement