IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information White Papers (View All Report Types)
 
The Dawn of the DDoS of Things & 1 Tbps Attacks
sponsored by A10 Networks
WHITE PAPER: In this white paper learn how to prevent Mirai maleware, a type of DDoS attacks hackers use to compromise unsecured IoT devices.
Posted: 01 Sep 2017 | Published: 30 Jun 2017

A10 Networks

Discover an Advanced Cloud-Based Threat Prevention Suite
sponsored by Juniper Networks, Inc.
WHITE PAPER: Inside this tech overview, learn about Sky Advanced Threat Prevention, a cloud-based service with features built to adapt to the ever-changing threat landscape and fend off today's ransomware and DDoS attacks.
Posted: 16 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Auto Scaling Security on AWS: Maintaining a Dynamic Security Posture on the Cloud
sponsored by AWS - Fortinet
WHITE PAPER: Don't be intimidated by the cloud migration process. This white paper explores how you can confidently move business-critical applications to the cloud while maintaining security and availability with Amazon Web Services (AWS) auto scaling and NGFWs.
Posted: 17 Nov 2017 | Published: 30 Apr 2017

AWS - Fortinet

Top 3 Challenges Your Team Faces when Building in the Cloud
sponsored by TrendMicro
WHITE PAPER: In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

TrendMicro

TOP 10 Considerations for Bot Management
sponsored by Akamai Technologies
WHITE PAPER: There are countless vendors claiming to provide you with bot management solutions and comprehensive protection, but what do you really need to keep your own environment safe? Read this list of the top 10 things to consider when selecting a bot management system.
Posted: 22 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

App-ID Tech Brief: Traffic classification that identifies applications traversing your network
sponsored by Palo Alto Networks
WHITE PAPER: In this technology brief, learn about App-ID, a patented traffic classification technology that identifies applications traversing your network. Find out how App-ID enables creation and enforcement of safe application enablement policies and brings increased application visibility and control back to the firewall.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

Palo Alto Networks

Data Breaches: Protect Your Organization with an Incident Response Program
sponsored by Cisco Systems, Inc.
WHITE PAPER: When a data breach occurs, your organization could be open to hackers and cybercriminals for up to 200 days. Thankfully, building a rapid incident response program isn't difficult, once you know how. This white paper outlines the critical process and major roles that can make that a reality.
Posted: 20 Sep 2017 | Published: 31 Dec 2015

Cisco Systems, Inc.

Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER: In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement