IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security White Papers (View All Report Types)
 
Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

Three Reasons a Secure Web Gateway is Vital for your Security Stance
sponsored by Symantec
WHITE PAPER: According to IDC, by 2020 there will be 105.4 million mobile workers. With this hike, mobile and web security cannot be compromised. This white paper describes what a secure web gateway (SWG) offers and 3 main reasons it is a vital component of your layered defense strategy.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Symantec

What is the Best Type of DDoS Protection for my Business?
sponsored by Arbor Networks
WHITE PAPER: Cisco predicts that by 2020, 17 million DDoS attacks will occur annually. In this white paper, learn which type of DDoS protection is best for your business.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arbor Networks

A Practical Guide for GDPR Compliance
sponsored by RSA
WHITE PAPER: According to an Osterman Research report, 64% of organizations are not ready to comply with the GDPR. Grab your copy of this Osterman Research practical guide to understanding your readiness. Don't miss the checklist on page 9.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

AWS Security Best Practices
sponsored by Amazon Web Services
WHITE PAPER: Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.
Posted: 09 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores the history of APIs and what makes them unique. Then, read on to learn 5 common threats facing APIs today a 3-tiered approach to securing both JSON and XML-based API endpoints, and more.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

Mobile Malware in the UK
sponsored by Lookout
WHITE PAPER: The average malware infection on a mobile device costs £6,400. With the rise of employees using mobile devices for work, companies need to be aware of the high cost and vulnerability of malware attacks. This white paper offers a malware case study to help organizations fight back against mobile threats.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by CyberArk Software, Inc
WHITE PAPER: According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

CyberArk Software, Inc

Monitoring Serverless Architectures in AWS
sponsored by AWS-Cisco
WHITE PAPER: The introduction of serverless architectures is helping reduce exposure to threats by breaking services into single-purpose functions with well-defined inputs and outputs. This white paper discusses methods of auditing and monitoring of Amazon Web Services Lambda functions and how to put these methods into practice.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

AWS-Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement