Software  >  

Joke Programs

RSS Feed    Add to Google    Add to My Yahoo!
Joke Programs White Papers (View All Report Types)
 
One Firewall Brand Decreases Complexity, Not Security
sponsored by Fortinet, Inc.
WHITE PAPER: This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

X-Force Cyber Security Intelligence Index  Report
sponsored by IBM
WHITE PAPER: It's clear no industry was immune to cyberattackers in 2015. Discover statistics from last year's cyber threat landscape and see which industries were most affected by cybercrime. Learn how to create an effective cybersecurity strategy to ensure your organizations doesn't show up on next year's report.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM

Security Teams Must Empower Employees to Prevent Phishing Attacks
sponsored by Mimecast
WHITE PAPER: Technology alone won't stop phishing attacks; empowering employees to prevent incidents is critical. Uncover ways to boost this level of security awareness, and help users protect themselves and the enterprise from these cybercrimes.
Posted: 02 Jun 2016 | Published: 20 Aug 2015

Mimecast

The Executive's Guide to the 2016 Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Unlock the Key to Repel Ransomware
sponsored by Kaspersky Lab
WHITE PAPER: As cybercriminals realize that victims are often willing to pay for the release of their precious files, the prevalence of ransomware and its variations are on the rise. Learn about the common trends in this type of cybercrime and recommendations to help your organization avoid victimization.
Posted: 09 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

S.I.R.M.: Security Incident Response Matrix
sponsored by Anomali
WHITE PAPER: This paper details the Security Incident Response Matrix (S.I.R.M.), a simple, easy to understand methodology used to help guide security operations staff in effectively triaging alerts and activity. The goal of this triage is to derive the intelligence necessary to understand the scope and threat of the activity.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Check Point Software Technologies Ltd.

Revealing Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: In its latest research report, BitSight studied the security performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

The Ransomware Threat - A Guide to Detecting an Attack Before it's Too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Learn all about ransomware in this white paper, including the 5 phases of a ransomware attack and the 5 steps of defending against one, including: prepare with various security measures, focus on detection, be ready for containment, and 2 more.
Posted: 13 May 2016 | Published: 13 May 2016

LogRhythm, Inc.

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement