IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

IHS Threats

RSS Feed    Add to Google    Add to My Yahoo!
IHS Threats White Papers (View All Report Types)
 
Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

Combating Insider Threats - The Application-level User Behavior Tracking Approach
sponsored by Intellinx Software Inc.
WHITE PAPER: This white paper looks at the growing problem of the insider threat and discusses the regulatory and other drivers that fuel the demand for new security solutions in this area. Find out how to mitigate insider threats and read this paper today.
Posted: 17 May 2007 | Published: 01 Apr 2006

Intellinx Software Inc.

Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER: Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Novell, Inc.

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

Protecting Information from Insider Threats
sponsored by McAfee.
WHITE PAPER: Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

McAfee.

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

How to Protect Your Critical Resources with Identity-based Access Control
sponsored by AEP Networks
WHITE PAPER: This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges.
Posted: 23 Apr 2008 | Published: 01 Apr 2008

AEP Networks

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

LogRhythm, Inc.

Securing WLANs with Two-factor Authentication
sponsored by RSA
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement