IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security White Papers (View All Report Types)
 
Understanding and Mitigating DDoS Attacks
sponsored by Dyn
WHITE PAPER: Discover a number of DNS DDoS attack concepts and mitigation strategies and learn the critical role DNS plays in the performance of your online business, common types of DDoS attacks, best practices to protect your DNS infrastructure against DDoS attacks, and more.
Posted: 11 May 2017 | Published: 11 May 2017

Dyn

The Top 6 WAF Essentials to Achieve Application Security Efficacy
sponsored by Citrix
WHITE PAPER: Due to the nature of web security and how it constantly evolves, it is increasingly difficult to integrate comprehensive security into applications and keep them up-to-date. In this white paper, learn the 6 essential features your web application firewall (WAF) needs to maintain a high degree of security,
Posted: 27 Apr 2017 | Published: 27 Apr 2017

Citrix

Operationalizing Threat Intelligence for Enterprise Security
sponsored by Splunk
WHITE PAPER: In this white paper, learn about a system designed to help you manage, categorize, and investigate security anomalies based on data that has been automatically collected and aggregated from multiple sources.
Posted: 19 May 2017 | Published: 19 May 2017

Splunk

Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 01 May 2017 | Published: 01 May 2017

Splunk

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black

Your Guide to Secure ESFF File Sharing
sponsored by BlackBerry
WHITE PAPER: Discover how EFSS can fulfill the needs of employees who want seamless mobile collaboration and to leverage tech to increase productivity, while also allowing IT to protect sensitive information and help the company embrace innovative new technology that can deliver on key business goals.
Posted: 11 May 2017 | Published: 11 May 2017

BlackBerry

6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

MobileIron and iOS: The Security Backbone for the Modern Enterprise
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.
Posted: 09 May 2017 | Published: 09 May 2017

MobileIron
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement