IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Vulnerability

RSS Feed    Add to Google    Add to My Yahoo!
Network Vulnerability White Papers (View All Report Types)
 
Explore a Security Intelligence Model for Combating Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover how to fully realize your security intelligence objectives. You'll learn how to keep your security architecture flexible to adopt and mature security intelligence capabilities over time and significantly reduce your risk of experiencing costly cyber incidents moving forward.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogRhythm, Inc.

Infographic: Mitigating the Impact of Critical IT Events
sponsored by Splunk Services UK Ltd
WHITE PAPER: Discover facts and figures regarding critical IT events (CIE) in this infographic. You'll learn the economic impact of CIE's, how they're negatively effecting organizations and learn mitigation techniques to reduce the damage caused by CIE's.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Splunk Services UK Ltd

Cracking the Code on Application Security Success
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to develop your own application security (AppSec) programs to reduce cyber risk and enable business to run as smoothly as possible. Learn key answers to your most pressing AppSec questions and get practical advice for working across teams to ensure the success of your new AppSec program.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Research Reveals How 12 Managed Security Services Options Compare
sponsored by IBM
WHITE PAPER: This analyst report evaluates 12 leading MSSPs' strengths, weaknesses, and capabilities, including offerings from IBM, Verizon, HP, Dell, Symantec, and other major players in the industry. View now to learn how these providers stack up on criteria including the following: threat intelligence, pricing, customer experience, and more.
Posted: 21 Apr 2015 | Published: 11 May 2015

IBM

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks
sponsored by IBM
WHITE PAPER: A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent the 5 most harmful occurrences.
Posted: 25 Aug 2016 | Published: 01 Nov 2015

IBM

Cb Defense
sponsored by Carbon Black
WHITE PAPER: Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.
Posted: 27 Jul 2016 | Published: 01 Jun 2016

Carbon Black

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement