IT Management  >   Systems Operations  >   Security  >   Network Security  >  

ID

RSS Feed    Add to Google    Add to My Yahoo!
IDWhite Papers (View All Report Types)
 
Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos, Inc.

Adaptive Security for the Health/Pharma Vertical
sponsored by Juniper Networks, Inc.
WHITE PAPER: Healthcare and pharmaceutical organizations are more sophisticated than ever before; but with that sophistication, they also face new challenges.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

Juniper Networks, Inc.

The Essentials Series: Security Information Management
sponsored by Dell SecureWorks
WHITE PAPER: This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
Posted: 02 Dec 2009 | Published: 09 Oct 2009

Dell SecureWorks

CounterTack Active Forensics: Continuous Network Monitoring for In-Progress Attacks
sponsored by CounterTack
WHITE PAPER: The security tools and strategies in use today are not enough to fight off APTs. Organizations need a new level of security that enables them to actively engage with attackers and take control of the impact of an attack in progress. Uncover how meet these needs with an active forensic system that provides better visibility and intelligence.
Posted: 22 Jun 2012 | Published: 22 Jun 2012

CounterTack

GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
sponsored by GlobalSign
WHITE PAPER: This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
Posted: 17 May 2011 | Published: 17 May 2011

GlobalSign

How Does Virtualization Change Your Approach to Enterprise Security?
sponsored by GlassHouse Technologies, Inc.
WHITE PAPER: As with any new technology, in order to achieve a secure implementation, it is necessary to augment existing policies and practices with an understanding of how virtualization works. Read this paper to find out more.
Posted: 17 Jun 2010 | Published: 17 Jun 2010

GlassHouse Technologies, Inc.

Understanding WMI Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Selecting the Right Host Intrusion Prevention System: 12 Key Questions to Ask
sponsored by Third Brigade
WHITE PAPER: This white paper identifies 12 critical questions that organizations need to consider when selecting a HIPS product. These questions relate to protection, manageability, integration and speed.
Posted: 18 Jun 2007 | Published: 15 May 2007

Third Brigade
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ID White Papers | ID Multimedia | ID IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement