IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero ThreatsWhite Papers (View All Report Types)
 
The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection
sponsored by Bit9, Inc.
WHITE PAPER: This white paper defines potential compliance and security gaps; identifies the effect that these gaps can have on your organization; and explains how a positive security solution can close these gaps to ensure the security of servers and endpoints, as well as PCI DSS compliance.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Bit9, Inc.

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

Collaborative Defense-- HP Security Research
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper from HP Security Research demonstrates why collaboration is essential in defending businesses from cyber attacks and how it can work.
Posted: 11 Dec 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Modernize your Active Directory
sponsored by Dell Software
WHITE PAPER: This exclusive white paper takes an in-depth look at Active Directory, which can be used to mitigate risk and reduce costs with security software. Read on to learn more.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Dell Software

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning--24 percent of companies do not meet minimum requirements for security monitoring.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

2014 Cost of Cyber Crime Study: Australia
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the economic impact of cyber-crime on Australia in 2014.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Cloud Security Solutions You Can Trust
sponsored by Intel Corporation
WHITE PAPER: This white paper explains how cloud security solutions from Intel and VMware can enable your organization to confidently deploy a cloud infrastructure by safeguarding your sensitive data and strengthening regulatory compliance.
Posted: 20 Nov 2014 | Published: 30 Apr 2013

Intel Corporation

Minimize Cheque Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement