IT Management  >   Systems Operations  >   Security  >  

Internet Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security Threats White Papers (View All Report Types)
 
Pervasive Security Enabled by Next Generation Monitoring Fabric
sponsored by Big Switch Networks
WHITE PAPER: As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.
Posted: 05 Apr 2016 | Published: 29 Dec 2015

Big Switch Networks

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

Laptop Management for Windows
sponsored by IBM
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM

CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

The Global Cost of Cyber Crime
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Best Practices to Contain Cyberattacks
sponsored by Illumio
WHITE PAPER: As cyberattacks become more sophisticated, it is time to make a shift in your IT security strategy. One that involves redefining how to contain and handle the inevitable attack. Uncover the 7 best practices you must take to gain control over your enterprise security.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Illumio
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement