IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management White Papers (View All Report Types)
 
Identifying TTPs with threat intelligence With Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Learn the finer points of knowing how to counter the tactics, techniques, and procedures (TTPs) of a malicious attacker. Uncover the value of identifying attacker TTPs and understanding information source types to ultimately improve relevant and timely intelligence reporting.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Cost Savings, Risks, and Benefits: Armor Complete And Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester report, discover the security benefits, cost savings, associated risks and ROI of the Armor Complete and Armor Anywhere cloud data protection tools. Gain insight into what makes it and what doesn't in the face of today's threat landscape.
Posted: 08 Mar 2017 | Published: 31 Jan 2017

Armor

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: In this white paper find how to set up your enterprise for future Internet of Things success, how to handle common problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Intelligent Security Operations: A How-To Guide
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find your roadmap for implementing an intelligent, analytics-driven security operations center in this white paper. Discover how to gain visibility into your organization to detect and respond to existing and new threats.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Hewlett-Packard Enterprise

Comparing SIEM, Big Data, and Behavior Analytics
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how SIEM can effectively secure your organization's logs where big data can fail. Discover the components of effective and mature SIEM, SIEM's correlation with security context, scaling security detection, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Hewlett-Packard Enterprise

Continuous Endpoint Threat Detection and Response in a Point-in-Time World
sponsored by Cisco Systems, Inc.
WHITE PAPER: The only way to defeat today's security threats is to address them holistically across the full attack continuum – before, during, and after an attack. Discover an approach of continuous endpoint analysis in combination with a big data architecture to combat today's malware threat landscape.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Cisco Systems, Inc.

A Data Protection Suite for Archive Solution Specification
sponsored by Dell and Microsoft
WHITE PAPER: In this white paper, learn about a 5 individual security suites designed to solve a broad spectrum of data protection issues.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

Dell and Microsoft

Your Guide to the 2016 Global Threat Intelligence Report
sponsored by Cisco and Dimension Data
WHITE PAPER: Security isn't just beating today's threats: It's a matter of preparing for future threats and mitigating their effects. Dive into this global threat intelligence report and learn how to leverage deep insight into lessons learned from 2016 and 2015, what weaknesses the industry has yet to rectify, what hackers are targeting and where, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco and Dimension Data

Remove Complexity from Defending Data with a Secure Managed Cloud
sponsored by Armor
WHITE PAPER: The complexities of cybersecurity are daunting for any organization. But for businesses that need battle-tested security and infrastructure to defend critical data workloads and assets that intricacy is magnified. Learn about a cloud security platform that can remove the complexity from defending data with key security functionality.
Posted: 15 Mar 2017 | Published: 30 Dec 2016

Armor

Six Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER: Let this white paper be your guide to implementing an effective, risk-based security approach. Learn how to identify the 6 key components needed to launch this type of approach, why it's effective at mitigating threats, and where you can customize the approach to provide maximum protection.
Posted: 07 Mar 2017 | Published: 07 Mar 2017

Dell SecureWorks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement