Vertical Industries  >   Financial Services Industry  >  

Futures Trading

RSS Feed    Add to Google    Add to My Yahoo!
Futures Trading White Papers (View All Report Types)
 
Sweden: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Sweden experience the most email attacks, including: malware, phishing, and spam?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

LogRhythm, Inc.

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec

Are You a Proxy Pro? Put Yourself to the Test
sponsored by Symantec
WHITE PAPER: ProxySG consolidates a broad feature-set to authenticate users, filter web traffic, identify cloud application usage, and provide data loss prevention and more. Check out these key capabilities you should leverage on your Blue Coat Proxy.
Posted: 23 Aug 2017 | Published: 31 Dec 2016

Symantec

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and Intel® Xeon
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and Intel® Xeon

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

2012 Bit9 Cyber Security Research Report
sponsored by Bit9, Inc.
WHITE PAPER: Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers.
Posted: 23 May 2012 | Published: 23 May 2012

Bit9, Inc.

Are You Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.
Posted: 21 Aug 2014 | Published: 14 Mar 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement