Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed    Add to Google    Add to My Yahoo!
Loss Management White Papers (View All Report Types)
Case Study: Local Government Finds Cybersecurity that Meets its Budget
sponsored by AlienVault
WHITE PAPER: This white paper tells the story of how the IT managers for the City of Lewiston found a security solution that worked for them, keeping their network secure without incurring additional costs or requiring additional manpower.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 12 Nov 2015 | Published: 30 Jun 2015

Hewlett Packard Enterprise

Building a Custom Defense for Today's Security Threats
sponsored by Trend Micro
WHITE PAPER: This white paper offers a series of solutions designed to help your organization prevent the potential consequences of advanced threats.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Trend Micro

Breach Preparation: What you need to know
sponsored by Bit9 + Carbon Black
WHITE PAPER: This eBook tells you everything you need to know about protecting your business against today's advanced cyber-attacks. Read on to learn about how to increase the safety of endpoint, the different paths to attack, exfiltration, and more.
Posted: 06 Nov 2015 | Published: 06 Nov 2015

Bit9 + Carbon Black

Get Your Website in Shape with a Security Health Checkup
sponsored by Symantec Corporation
WHITE PAPER: Access this security report to help you diagnose the health of your web security, and discover best practices to help you determine how to secure your site against attacks most common in 2015.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Symantec Corporation

Securing Your Healthcare Network with the Threat Intelligence Cloud
sponsored by Palo Alto Networks
WHITE PAPER: This white paper examines a cloud platform that will ensure consistent end-to-end security throughout your organization. Get access now to learn how to increase tighter regulations to protect your mobile workers and the core of your cloud-enabled data center.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Palo Alto Networks

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Vendor Comparison: Choose the Right DDoS Service Provider
sponsored by Akamai
WHITE PAPER: This Forrester report examines nine of the most significant offerings in the DDoS protection market, giving you insight into the strengths and weaknesses of each one.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


IT's Confidence in Threat Defenses May Be Misplaced
sponsored by Intel Security
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Intel Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement