IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016


Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. You'll also explore the emerging role of sandboxing as a powerful weapon in cyber security.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Check Point Software Technologies Ltd.

5 Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: Could manages security service providers (MSSPs) be the answer to this conundrum? This white paper discusses the benefits of adopting an MSSP, listing 5 key reasons how they can improve your cyber defenses.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


Business on the Internet - A Scary Reality
sponsored by LogicNow
WHITE PAPER: This white paper shows you different methods cybercriminals can use to ruin your business. The vast majority of infections can be attributed to user error falling victim to their tactics.
Posted: 13 Jan 2016 | Published: 04 Jan 2016


The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector
sponsored by A10 Networks
WHITE PAPER: In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Industry Assessment: Key Findings on Effective Threat Protection
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.
Posted: 12 Aug 2016 | Published: 17 Mar 2016

Check Point Software Technologies Ltd.

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Create Access Controls and Visibility for Any Wired or Wireless Network
sponsored by Aruba Networks
WHITE PAPER: Learn about an adaptive security approach that can provide access controls and visibility for any wired and wireless network, and allow you to set policies based on contextual data, streamline the onboarding of mobile devices, and more.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

Aruba Networks

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015


Top IT Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shares the top 5 security priorities that concerned network security professionals over the last year.
Posted: 17 Nov 2015 | Published: 08 Apr 2015

Fortinet, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement