IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Threats White Papers (View All Report Types)
 
Why extending Your VPN to the cloud will bring better performance and security
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: Many organizations lack accurate threat detection and informed risk-management capabilities. Access this white paper and learn how security intelligence can address these shortcomings – and critical concerns in 6 key areas – to maintain comprehensive and cost-effective information security.
Posted: 18 Feb 2016 | Published: 17 Jun 2015

IBM

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud
sponsored by Unisys
WHITE PAPER: Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.
Posted: 16 May 2016 | Published: 16 May 2016

Unisys

Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

Top Strategies to Automate Across Your Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: The cloud is forcing IT decision-makers to re-evaluate how they deploy their networks to ensure the best security and efficiency. Attackers know the cloud is their next big target. Access this white paper to learn how to deal with the threat landscape and drive business forward while reducing operating costs.
Posted: 06 May 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: Discover how to leverage endpoint detection and response (EDR) to create truly intelligent endpoints that automatically detect and respond to threats before they do their damage. Additionally, read on to see 5 criteria to look for when researching EDR solutions so you can determine which are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Access this paper to view the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

Why Traditional Data and Network Security is Not Good Enough
sponsored by Unisys
WHITE PAPER: Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

Higher Education: How to Comply with Network Security Legislation
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a way for higher education institutions to comply with IT security regulations and protect students and staff from harmful content by consolidating multiple security services into a single, high performance device that cuts equipment, administration, and management costs.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement