IT Management  >   Systems Operations  >   Security  >  

Internet Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security Threats White Papers (View All Report Types)
 
Windows 10, EMM, and the Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: This white paper examines how Windows 10, enterprise mobility management (EMM) platforms, and mobile devices are changing the way you can approach complicated security and management tasks. Uncover the top 5 PC management capabilities of EMM, key considerations in adopting an EMM platform, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

MobileIron

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices, as well as how to apply them to cloud-based infrastructures and 5 considerations for securing hybrid clouds. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

10 Reasons to Archive Your Email in the Cloud
sponsored by LogicNow
WHITE PAPER: Discover why archiving your email in the cloud can give your enterprise security and compliance advantages, plus other important benefits, such as: hitting the ground running with a low barrier to entry, more certainty when estimating costs versus in-house, lower management costs, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

LogicNow

Who Will CAVE First: Likely Targets of Ransomware
sponsored by Radware
WHITE PAPER: The following resource lists an acronym that highlights four key areas criminals will assess in their decision to target people and companies. Learn how to avoid being a victim by getting inside the mind of a ransomware attacker.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Don't let your on-premises Active Directory be your Achilles' heel
sponsored by Dell, Inc.
WHITE PAPER: Learn how a hybrid Active Directory (AD) can keep your network safe from the vulnerability normally suffered by on-premises ADs. Discover how it establishes configuration baselines, detects and alerts administrators of realized and potential threats, and remediates unauthorized access and security changes.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Dell, Inc.

The Virtual Firewall Buyer's Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Juniper Networks, Inc.

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Fortunately, it's possible for organizations with limited budgets and higher risk tolerances to achieve significant improvements in security maturity. Discover ways to adopt mature capabilities by building an integrated architecture.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

The Future of Enterprise Mobile Security: Predictions for 2016 and Beyond
sponsored by Lookout
WHITE PAPER: Understanding and successfully combatting security threats that mobility creates is paramount for continued protection of sensitive company and customer data. This white paper provides Lookout's mobile cybersecurity predictions for 2016 to 2019, so you can futureproof your enterprise.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

Reeling in Ransomware Data Protection for You and Your Users
sponsored by Code42
WHITE PAPER: In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement