IT Systems  >   Business Systems  >   Security Systems  >  

ID Systems

RSS Feed    Add to Google    Add to My Yahoo!
ID Systems White Papers (View All Report Types)
Practical Threat Management for Healthcare Organizations
sponsored by AlienVault
WHITE PAPER: This white paper can help you overcome some of the many hurdles that healthcare security faces. Read on to keep your compliance needs met and your patient data safe.
Posted: 23 Oct 2015 | Published: 31 May 2015


Dangers of the Deep, Dark Web
sponsored by IBM
WHITE PAPER: This white paper describes two of the most frequently used Deep Web networks and suggests how you can stay safe from attacks that originate there.
Posted: 11 Sep 2015 | Published: 31 May 2015


Practitioner's Guide to Establishing an SOC
sponsored by AlienVault
WHITE PAPER: This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013


HP TippingPoint: Next Generation Intrusion Prevention System
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Consult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company.
Posted: 27 Aug 2012 | Published: 27 Aug 2012

Hewlett Packard Enterprise

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013


Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013


Multiple Lines of Defense
sponsored by ENDFORCE, Inc
WHITE PAPER: No single countermeasure can protect your network from every conceivable threat, this white paper examines how to effectively mitigate risk by implementing an integrated multilayered security system for controlling endpoint attacks.
Posted: 05 Apr 2006 | Published: 31 Dec 2005


Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Modern Malware Threats and Countermeasures
sponsored by Sunbelt Software
WHITE PAPER: Many of the early mass-infection events were highly publicized and very obvious events to the user, modern malware is usually designed to be much more subtle in its behaviors. learn about the newest methods and practices hackers are using.
Posted: 17 Nov 2008 | Published: 12 Nov 2008

Sunbelt Software

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement