IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Internet Security Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security Vulnerabilities White Papers (View All Report Types)
 
HIPAA Compliance & Risk Management
sponsored by Armor
WHITE PAPER: Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.
Posted: 11 Jul 2016 | Published: 31 Dec 2015

Armor

Research Reveals How 12 Managed Security Services Options Compare
sponsored by IBM
WHITE PAPER: This analyst report evaluates 12 leading MSSPs' strengths, weaknesses, and capabilities, including offerings from IBM, Verizon, HP, Dell, Symantec, and other major players in the industry. View now to learn how these providers stack up on criteria including the following: threat intelligence, pricing, customer experience, and more.
Posted: 21 Apr 2015 | Published: 11 May 2015

IBM

Illuminating the Real Cost of Incidents from an Insurer's Perspective
sponsored by AllClear ID
WHITE PAPER: This study helps you understand the true impact of data insecurity and the real cost of incidents by consolidating claims data from multiple insurers.
Posted: 28 Jun 2016 | Published: 31 Dec 2014

AllClear ID

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Ponemon Institute Application Security Risk Management Study
sponsored by IBM
WHITE PAPER: This report shows you the results of the recent Ponemon Institute study on how IT pros approach application security in their organizations. Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

Market Analysis: Security Information and Event Management (SIEM) Products
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this Gartner Magic Quadrant report for an overview of today's SIEM market, and an analysis of 14 different vendors to determine which SIEM product is right for you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015

LogRhythm, Inc.

Addressing the Full Attack Continuum (BDA WP)
sponsored by Cisco Systems, Inc.
WHITE PAPER: It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.
Posted: 13 Sep 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

3 Major Challenges to Securing Your Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report addresses the top 3 major security challenges as your organization moves into the cloud. Gain an overview of strategies for protecting your data and network.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement