Software  >  

Blended Threats

RSS Feed    Add to Google    Add to My Yahoo!
Blended Threats White Papers (View All Report Types)
 
Infographic – IRM Underground Data Center
sponsored by Iron Mountain
WHITE PAPER: Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

Iron Mountain

Reporting Cybersecurity to the Board
sponsored by BitSight
WHITE PAPER: Today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could come from a data breach. Download this free guide today, and you'll have everything you need for your next board presentation to hit all the right points.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

Achieving High Fidelity Security: An EMA White Paper
sponsored by RSA
WHITE PAPER: In the security context, "high fidelity" communicates the ability to provide a richer experience to the security analyst to deliver better security outcomes. Discover the benefits of using both network and endpoint data with a strong analysis toolset to create high-fidelity security.
Posted: 26 Aug 2016 | Published: 01 Jul 2016

RSA

Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Check Point Software Technologies Ltd.

Real-time Threat Detection: The Financial Industry's Best Friend
sponsored by HID
WHITE PAPER: Explore the effectiveness of real-time malware protection for financial institutions, banks, and any online business with financial transactions. See how this technology can help mitigate risks even from the most sophisticated malware.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

HID

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Cb Defense
sponsored by Carbon Black
WHITE PAPER: Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.
Posted: 27 Jul 2016 | Published: 01 Jun 2016

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement