IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Threats White Papers (View All Report Types)
 
The Promise and Risk of the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: Discover how operational tech like centrifuges and electrical grids can ensure robust security with IT/OT convergence efforts, create a foundation for greater cost and process efficiencies, gain a competitive edge derived from harnessing the power of the industrial Internet of Things, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

GDPR Requirements for Data Masking
sponsored by Delphix
WHITE PAPER: This white paper takes a look a data masking – one of the many techniques businesses can take advantage of when getting ready for the GDPR. Learn more about what data masking is and find out how to improve protection for sensitive data.
Posted: 12 Dec 2017 | Published: 30 Sep 2017

Delphix

6 Ways to Use Threat Intelligence Data
sponsored by Splunk
WHITE PAPER: Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: Discover the 10 network security tools and tests that you should consider implementing and know how to use.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Global Knowledge

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Evolving the Mobile Security Architecture Toward 5G
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper prepares your mobile security for 5G by examining the mobile threat landscape, software programmability and cellular standards.
Posted: 07 Jun 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement