IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
CybersecurityWhite Papers (View All Report Types)
1 - 25 of 192 Matches Previous Page  | Next Page
Channel Edge Reseller Program
sponsored by Webroot
WHITE PAPER: This brief white paper explains why organizations should choose an endpoint security solution from Webroot in order to provide their customers with the best security possible to deal with increased threats.
Posted: 16 Apr 2014 | Published: 30 Aug 2013

Webroot

Channel Edge MSP Program
sponsored by Webroot
WHITE PAPER: This white paper explains the new approach to endpoint security for MSPs from Webroot that ensures security while minimizing downtime, improving efficiency and cutting costs.
Posted: 16 Apr 2014 | Published: 30 Aug 2013

Webroot

The Case for GRC: Addressing the Top 10 GRC Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offer industry-leading advice on how to best leverage this investment.
Posted: 16 Apr 2014 | Published: 31 Dec 2012

RSA, The Security Division of EMC

The Total Economic Impact Of Silver Tail Systems
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this in-depth white paper, Forrester Consulting examines the total economic impact that enterprises may realize by deploying Silver Tail Systems Forensics software.
Posted: 14 Apr 2014 | Published: 31 Aug 2012

RSA, The Security Division of EMC

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Stopping Malicious Botnets
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 11 Apr 2014 | Published: 30 Nov 2012

Hewlett-Packard Limited

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA, The Security Division of EMC

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by EMC Corporation
WHITE PAPER: Access this informative, in-depth white paper and discover why financial institutions and merchants are the most common targets for cyber-attacks, and what steps these businesses can take to protect themselves against attacks.
Posted: 04 Apr 2014 | Published: 31 Oct 2013

EMC Corporation

Post-Breach Survival Guide
sponsored by INetU Inc.
WHITE PAPER: In this white paper, learn why an incident response plan is a must in today's vicious threat landscape. Click through to uncover 8 key elements to include in a proactive security posture.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 03 Apr 2014 | Published: 31 Jan 2014

IBM

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

Advanced Threat Protection with Dell SecureWorks Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

Dell SecureWorks UK

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Accelerating Incident Response and Reducing Security Risks
sponsored by Dell SecureWorks UK
WHITE PAPER: This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Dell SecureWorks UK

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Cisco

Automating Security for Greater SaaS Success
sponsored by CloudPassage
WHITE PAPER: In this resource, learn how automated security tools and compliance monitoring will attract more cloud consumers with ease-of-use, scalability, and portability.
Posted: 28 Mar 2014 | Published: 01 Nov 2013

CloudPassage

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 27 Mar 2014 | Published: 31 Oct 2013

IBM

Migrating from Windows XP: Understanding the Challenges and How to Mitigate Them
sponsored by Dell and Microsoft
WHITE PAPER: This paper describes how effective Windows migration projects can be broken down into four manageable phases, and how industry best practices and products can reduce the time and disruptions caused by a migration from XP to Windows 7 or 8, as well as provide IT more time and resources to focus on more strategic initiatives.
Posted: 26 Mar 2014 | Published: 01 Oct 2013

Dell and Microsoft

Cloud Servers: New Risk Considerations
sponsored by CloudPassage
WHITE PAPER: This white paper reveals the major risks associated with cloud servers.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

CloudPassage

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 26 Mar 2014 | Published: 31 Oct 2013

IBM

Assessing the Value of Next-Generation Firewalls (Gov)
sponsored by Dell Software
WHITE PAPER: This white paper describes the different types of network-based attacks and how they can affect your bottom line. Click through for recommendations on which security tools can help you prevent these threats.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Dell Software

Can the UK Find Security in US Cloud Services?
sponsored by Peak 10
WHITE PAPER: This resource goes over the facts about the UK's attitudes towards the cloud and data security and gives some insight into where the focuses will shift in the coming years.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge
1 - 25 of 192 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement