IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Level Threats White Papers (View All Report Types)
 
CIS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Posted: 04 Apr 2016 | Published: 23 Mar 2016

AlienVault

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Mobile Security Checklist: Plan for Security and Compliance
sponsored by Sierraware
WHITE PAPER: BYOD is becoming the norm in today's business landscape and it is a major security threat. Access this white paper to learn about internet exploits, insider abuse, regulatory compliance and a checklist of steps you can take to ensure secure mobile networking.
Posted: 13 Apr 2016 | Published: 01 Apr 2016

Sierraware

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Protect Against Zero-Day Attacks at the Every Level
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Check Point Software Technologies Ltd.

Help Your Security Team Sleep at Night
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This resource explores a platform that combines the packet, flow, application, infrastructure, and transaction data required to understand past security events. Uncover ways to make the right choices to strengthen and monitor cyber defenses.
Posted: 23 May 2016 | Published: 23 May 2016

Riverbed Technology, Inc.

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 14 Mar 2016 | Published: 08 Jul 2015

Absolute

University of Texas at Austin Ensures Network Security for its Distributed Campus
sponsored by Splunk
WHITE PAPER: Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Splunk

Top 6 Cyber Security Threats to iOS Devices
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper details the six most common types of attacks that impact iOS mobile devices. Access now and you'll learn the basic requirements for protecting against them.
Posted: 11 Feb 2016 | Published: 25 Jun 2015

Checkpoint Software Technologies

Make Endpoint Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this guide to uncover preloaded, validated and tested endpoint security strategies. Learn ways to extend data protection to employees on all endpoint devices, regardless of where they are located.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Dell, Inc. and Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement