IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Hostile Threats

RSS Feed    Add to Google    Add to My Yahoo!
Hostile Threats White Papers (View All Report Types)
 
Top 10 Reasons for Using Disk-based Online Server Backup and Recovery
sponsored by Iron Mountain
WHITE PAPER: Backup of business-critical data can be vital for the survival of any small to medium-sized business (SMBs). Read this paper to learn ten reasons why online server back up allows SMBs to cost-effectively backup data and concentrate on business goals.
Posted: 21 Feb 2007 | Published: 21 Feb 2007

Iron Mountain

Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

Symantec Corporation

How to Protect Your Critical Resources with Identity-based Access Control
sponsored by AEP Networks
WHITE PAPER: This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges.
Posted: 23 Apr 2008 | Published: 01 Apr 2008

AEP Networks

10 Easy Steps for Email and Web Best Practices
sponsored by Symantec Hosted Services
WHITE PAPER: Misuse and abuse of email and Web servers can create costly legal, regulatory, security and productivity risks for organizations. Read this paper to learn 10 best practices for maximizing compliance and minimizing email and Web risk in your org...
Posted: 02 Nov 2006 | Published: 01 Nov 2006

Symantec Hosted Services

Protecting Against Wikileak Type Events and the Insider Threat
sponsored by Verdasys
WHITE PAPER: Insider theft of sensitive data is not new. WikiLeaks is just the latest outlet for the disaffected individual to be amplified in our interconnected world. Everyone must face the reality that the insider threat is a growing danger that can't be overlooked. View this paper to explore the challenges of insider theft and how to prevent it.
Posted: 24 Oct 2011 | Published: 03 Jan 2011

Verdasys

Detect and Thwart Insider Threats
sponsored by Lancope
WHITE PAPER: This white paper discusses how you can stop insider threats with enhanced network visibility. Read on to learn how to keep your organization secure from the inside out.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

LogRhythm, Inc.

Strengthening Data Privacy in PeopleSoft
sponsored by Approva Corporation
WHITE PAPER: Understanding the vulnerabilities of ERPs such as Peoplesoft can help your company mitigate the risk of data breaches. This white paper discusses how automated CPM solutions can help to fight the threat of data loss.
Posted: 09 May 2008 | Published: 01 Mar 2008

Approva Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement