Standards  >  

P3P

RSS Feed    Add to Google    Add to My Yahoo!
P3P White Papers (View All Report Types)
 
Actionable Threat Intelligence: Your Guide to the OilRig Malware Campaign
sponsored by LogRhythm, Inc.
WHITE PAPER: The OilRig campaign of cyberattacks have cut a bloody, digital swath through banks and governmental entities in Middle Eastern countries and the U.S. Provide your organization with actionable intelligence regarding threat actors and the tools, techniques, and procedures the OilRig malware campaign uses.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

LogRhythm, Inc.

How LepideAuditor Helps You Detect and Prevent Ransomware Spread
sponsored by Lepide Software
WHITE PAPER: Learn about the important role of security audits in defending against increasingly complex ransomware attacks. Discover how to get real-time insights into changes in the configuration of systems like Active Directory, Exchange Server, and NetApp Filers.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

User Behavior Analytics: 11 Industry Leaders Offer Peer Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover peer insight into User Behavior Analytics (UBA), the result of interviews with 11 security leaders who have deployed or are looking to deploy 3rd party solutions.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

LogRhythm, Inc.

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Leveraging a Security-First Approach to Compliance
sponsored by evident.io
WHITE PAPER: Learn how to meet the challenges of public cloud environments with a modern approach of a security-first model which enables continuous visibility through automation and more.
Posted: 23 May 2017 | Published: 23 May 2017

evident.io

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
P3P White Papers | P3P Multimedia | P3P IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement