IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Internal Hostile Unstructured Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internal Hostile Unstructured Threats White Papers (View All Report Types)
 
Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance
sponsored by IBM
WHITE PAPER: This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...
Posted: 19 Nov 2007 | Published: 01 Mar 2007

IBM

Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

Symantec Corporation

Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER: Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

LogRhythm, Inc.

Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security
sponsored by Lumension
WHITE PAPER: Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter.
Posted: 10 Jun 2008 | Published: 15 May 2008

Lumension

Strengthening Data Privacy in PeopleSoft
sponsored by Approva Corporation
WHITE PAPER: Understanding the vulnerabilities of ERPs such as Peoplesoft can help your company mitigate the risk of data breaches. This white paper discusses how automated CPM solutions can help to fight the threat of data loss.
Posted: 09 May 2008 | Published: 01 Mar 2008

Approva Corporation

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER: Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security - an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement