Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware White Papers (View All Report Types)
NetFlow Generation: The Security Value Proposition
sponsored by Gigamon
WHITE PAPER: This white paper reviews the NetFlow generation framework and how to leverage it for network security.
Posted: 08 Oct 2015 | Published: 26 Aug 2015


Evaluating the Next Generation of Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper looks at a next-generation threat prevention tool, evaluating the effectiveness of this form of technology and the practicality of implementing it.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Check Point Software Technologies Ltd.

6 Key Security Transformations for Protecting Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper examines the six areas of cybersecurity that most need to transform if your business is going to stay secure in today's threat environment.
Posted: 03 Nov 2015 | Published: 30 Sep 2015


Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the total cost of web app security in the three major risk categories associated with successful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 01 Oct 2015 | Published: 14 Oct 2013

WhiteHat Security

Don't Wait Until Next Year to Build Better Defenses
sponsored by Intel Security
WHITE PAPER: This infographic discusses how you can implement endpoint security that's suitable for today's advanced targeted attacks.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Intel Security

IT's Confidence in Threat Defenses May Be Misplaced
sponsored by Intel Security
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Intel Security

Remove Network Traffic Blind Spots
sponsored by Radware
WHITE PAPER: In this white paper, learn how to shine a light on all network traffic shadows and dark spots to mitigate malicious programs and attacks. Continue reading to examine the 8 considerations for choosing an SSL visibility strategy.
Posted: 12 Nov 2015 | Published: 15 Apr 2015


What Erodes Trust in Digital Brands?
sponsored by Neustar®
WHITE PAPER: This informative white paper presents the statistics of why customers don't trust brands and offers insight into how to tailor your network security strategy to avoid data breaches and reputation defamation.
Posted: 04 Sep 2015 | Published: 26 Aug 2015


Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015


Enhance Security Visibility to Improve Incident Response and Compliance
sponsored by OpenDNS
WHITE PAPER: In this white paper, explore the limitations of traditional security log measures such as firewalls, AD, and web proxies and why it's imperative to gain complete visibility over DNS and your network. View now to learn how to eliminate network security blind spots and enable your SIEM to detect masked cybersecurity threats.
Posted: 08 Oct 2015 | Published: 30 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement