Software  >  

Blended Threats

RSS Feed    Add to Google    Add to My Yahoo!
Blended Threats White Papers (View All Report Types)
 
Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk
sponsored by One Identity
WHITE PAPER: Go in depth and learn what a hash is and how a PtH attack can greatly impact your network. Learn how to mitigate these types of attacks with Privileged Password Manager and Privileged Session Manager.
Posted: 09 May 2016 | Published: 31 Dec 2014

One Identity

Webster Bank: Helping to stop online fraud before it happens
sponsored by IBM
WHITE PAPER: Webster Bank found what they needed by deploying an endpoint-centric fraud prevention solution. They now can protect mobile and desktop devices against malware and phishing attacks before they occur. After only 12 months of usage, 224 infections were detected and resolved, helping prevent the possibility of millions of dollars lost due to fraud.
Posted: 30 Jun 2016 | Published: 31 Dec 2014

IBM

Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript
sponsored by Intel Security
WHITE PAPER: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Published: 01 May 2016

Intel Security

Preventing Fraud Before Customers Become Affected
sponsored by IBM
WHITE PAPER: Learn how Pulaski Bank achieved the layered security and malware prevention they were looking for and how their struggles can benefit your organization. Not only will you prevent potential fraud, but also increase customer awareness.
Posted: 09 Jun 2016 | Published: 01 May 2016

IBM

Disrupting Targeted Attacks Solution Guide
sponsored by Intel Security
WHITE PAPER: Reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now and find out how to synthesize your IT operations and security controls to form an agile, increasingly automated (and rock-solid) security architecture.
Posted: 05 May 2016 | Published: 01 Apr 2016

Intel Security

Integrating Host Systems With Modern Security Frameworks
sponsored by Novell Ltd.
WHITE PAPER: This white paper reveals a practical way to bring your host systems into the modern security fold. Close the technology gap without jeopardizing business operations.
Posted: 31 May 2016 | Published: 01 Apr 2016

Novell Ltd.

Infographic – IRM Underground Data Center
sponsored by Iron Mountain
WHITE PAPER: Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

Iron Mountain

Data Breach Digest 2016: 500 cybersecurity incidents investigated
sponsored by Verizon
WHITE PAPER: 84-page Data Breach Digest shines a light on some of the most prevalent incident scenarios to show you what you can do in the face of disaster. Access now to learn how you can best mitigate threats in the future.
Posted: 05 May 2016 | Published: 01 Apr 2016

Verizon

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement