IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Security ThreatsWhite Papers (View All Report Types)
 
Defending Against Application Denial of Service Attacks
sponsored by Akamai Technologies
WHITE PAPER: This paper will dig into application DoS attacks, offering both an overview of common attack tactics and possible mitigations for each. By the end of the paper you should have a guide and an understanding of how your application availability will be attacked, and what you can do about it.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Security is not usually one of the first places companies look to trim expenses, but some IT professionals believe that they can easily lower costs by eliminating third-party Secure Sockets Layer (SSL) Certificate Authorities (CAs) from the budget equation. However, this kind of reasoning can backfire – badly.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Shavlik Patch: Simplified Application Patch Management for Microsoft System Center
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patch management solution that will reduce your security risks from unpatched, non-Microsoft third-party applications.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

Risk Management and Security Consulting
sponsored by CDW Corporation
WHITE PAPER: This exclusive whitepaper explores security tests that will help you identify your gaps in security and pick out the threats you are most vulnerable to.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

CDW Corporation

Piercing the Veil of Masked Cyber Criminals
sponsored by DomainTools
WHITE PAPER: In this helpful white paper, discover a new security solution that can help you identify cyber criminals, build a cyber-attack profile, and more effectively protect your valuable data and assets.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Improve Your Security in 30 Days with HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This (slightly tongue-in-cheek) white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Hewlett-Packard Company

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Anatomy of a Cyber-Attack: How Cyber Criminals Operate, and How You Can Stop Them
sponsored by Icomm Technologies
WHITE PAPER: In this informative resource, get an inside look the basic steps of a cyber-attack, from reconnaissance to intrusion to malware insertion, as well as new integrated security solutions that can help prevent these malicious activities from disrupting your business.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

Icomm Technologies

All the Unusual Suspects
sponsored by Software AG
WHITE PAPER: This exclusive whitepaper breaks down the who, what, where, when, and why of automated surveillance in the financial market.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Software AG

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement