IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management White Papers (View All Report Types)
 
The Key to Advancing from Bot Management to Bot Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about how you can better secure your IT environment by putting a common hacker tool, bots, to your own use, and how you can advance from simple bot management to bot security.
Posted: 21 Sep 2017 | Published: 03 Mar 2017

Akamai Technologies

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

Remediation and Mitigation for Windows Active Directory Security
sponsored by Quest
WHITE PAPER: Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Quest

Effective Incident Response Through User Activity Monitoring
sponsored by Veriato, Inc.
WHITE PAPER: The longer a cyber incident remains undiscovered, the more likely it will be that the organization will realize a significant data breach. Explore how to achieve effective incident response through user activity monitoring.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Veriato, Inc.

How UEBA Reduces the Threat of Insider Data Leakage
sponsored by Veriato, Inc.
WHITE PAPER: Insider access means an employee can learn where sensitive data resides, the value of that data, and the best times to initiate an attack. This white paper examines how you can stop insider data leaks.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Veriato, Inc.

Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Fortinet, Inc.

Achieving Hybrid Cloud Visibility and Security
sponsored by Splunk
WHITE PAPER: One of the top challenges of hybrid cloud environments is a lack of comprehensive management, security, and visibility across the entire IT infrastructure. Explore 5 capabilities needed for stronger security and visibility in a hybrid cloud environment.
Posted: 30 Aug 2017 | Published: 04 Aug 2017

Splunk

Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement