IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Threats White Papers (View All Report Types)
 
Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

Advanced Session Security
sponsored by CA Technologies
WHITE PAPER: Surveys show that IT security experts have identified session hijacking as one of the top three security risks. Access this white paper and uncover details on two highly successful methods for enhancing session security.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

CA Technologies

MSSP Success Checklist
sponsored by AlienVault
WHITE PAPER: This white paper acts as a checklist for MSSP implementation in your organization. Review the template and find out how to centralize management and get organized.
Posted: 20 Jan 2016 | Published: 30 Dec 2015

AlienVault

Modernize and Secure your Business
sponsored by Microsoft
WHITE PAPER: In this solution brief, you'll learn how modern businesses are meeting the expectations of workers to be able to work anywhere, anytime on virtually any device. Discover ways to manage devices and provide workers with secure access to the corporate data and apps they need.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

Microsoft

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

The Insider Threat: From Risk to Detection
sponsored by Interset Software Inc.
WHITE PAPER: In this white paper, you will learn the 3 most common types of insider attacks and how to build an effective defense against them.
Posted: 12 Jan 2016 | Published: 30 Dec 2015

Interset Software Inc.

Cisco Advanced Malware Protection for Endpoints
sponsored by Cisco
WHITE PAPER: This white paper shows you endpoint security that goes beyond point-in-time detection to provide the level of visibility and control you need to stop advanced threats.
Posted: 04 Feb 2016 | Published: 27 Jan 2016

Cisco

Deploy an Enterprise Mobility Gateway to Optimize Access Control
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to scale, secure, and optimize control of your anytime, anywhere network, cloud, and application access. Read this paper to securely manage your workforce mobility and unburden your IT department and learn how to deliver seamless user access to all web-based resources.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement