Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
51 - 75 of 1106 Matches Previous Page  |  Next Page
Open Access
sponsored by STEALTHbits
WHITE PAPER: Discover how to discern who has access to your unstructured data and see all open shares on your network. Protect against malicious access, reduce security risk, fulfill compliance requirements and decrease operations expense by first accessing this valuable resource.
Posted: 13 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Can Enterprises Hire Their Way Out of Cloud Security Risks?
sponsored by Palerra Inc.
WHITE PAPER: This white paper explores the essential question: Can enterprises hire their way out of cloud security risks? As more employees connect their personal devices to your cloud environment, the answer to this question becomes even more crucial. Discover what roles hiring and automation are playing in mitigating cloud security risks.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Palerra Inc.

Securing Connected Cars Through Comprehensive Software Testing
sponsored by Synopsys
WHITE PAPER: There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle roles into the dealership.
Posted: 13 Sep 2016 | Published: 01 Aug 2016


Mobile Malware Hits Active Sync-Only Devices
sponsored by MobileIron
WHITE PAPER: Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn not only why ransomware is one of the favored tools of the cybercriminal, but also how enterprises fall prey to it, how it attacks their systems, and how to prevent it. Also learn common pitfalls when preparing to combat this threat, and four countermeasures to keep your data safe.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

TrendMicro

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Advanced Security Platform for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: If your organization is looking to migrate to Microsoft Office 365, you might be wondering whether additional security is needed. Discover how to safeguard users against advanced threats and targeted attacks and gain the power to identify these attacks as they happen.
Posted: 12 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Cyber Ransom Survival Guide
sponsored by Radware
WHITE PAPER: The following resource offers a concise overview of ransomware -- including the current threat landscape, who's likely to be targeted, and the marketplace and tools fueling the trend. Access now and you'll also learn about questions you need to ask and next steps you need to take to safeguard your organization.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

Radware

3 Steps to Getting Data Access Governance off Your To Do List
sponsored by STEALTHbits
WHITE PAPER: Data Access Governance (DAG) has been that to-do item IT Security has had for years, but they just kept pushing it aside for other goals. Today, however, there are strategies which can make DAG more approachable. In this free White Paper we are going to break DAG down into 3 steps that you can use to finally check this big one off your list.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

BMC

314 Day Battle Plan - The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Enabling The Industrial Internet Through Software Assurance
sponsored by Synopsys
WHITE PAPER: Access this white paper to better understand the far reaching effects vulnerable industrial technologies could have on the world. Learn from organizations who have dealt with crippling cyber attacks and discover how to instill confidence in your devices' security moving forward.
Posted: 08 Sep 2016 | Published: 01 Aug 2016


Best Practices for Social Media Archiving and Security
sponsored by Proofpoint, Inc.
WHITE PAPER: While social media can provide a number of important benefits to organizations, increasing use of social media comes with several security/compliance risks and costs. Uncover social media usage statistics, risk possibilities and how to best employ social media securely for your organization.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

NGFW Requirements for SMBs and Distributed Enterprises
sponsored by Cisco Systems, Inc.
WHITE PAPER: Within this informative white paper, you'll discover NGFWs specifically tailored for your SMB as well as distributed enterprises. Learn how to achieve next generation security with advanced threat protection, low TCO, and flexible management.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

Cisco Systems, Inc.

Understanding Account Takeover Attacks
sponsored by IMMUNIO, Inc.
WHITE PAPER: Discover the necessary steps to prevent hacking via stolen credentials on your web applications. Learn how to protect your online accounts and get to the bottom of why hackers want to take over these accounts.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

IMMUNIO, Inc.

How One SIEM Strategy Stacks Up
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource takes a look at one SIEM strategy and rates its features, performance, documentation, support, and value. Access now to determine if it's time for your organization to consider a different approach to SIEM technology.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

LogRhythm, Inc.

Case Study: Office 365 Enterprise Strengths
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

2016 Digital Channel Threat Report: Enabling Secure Convenience
sponsored by SAS
WHITE PAPER: To successfully prevent fraud while retaining the benefits of offering digital financial services, financial institutions must understand how cybercriminals exploit these capabilities. Read on to explore strategies for protecting mobile wallets, digital account opening, and more.
Posted: 06 Sep 2016 | Published: 31 May 2016

SAS

A New Security Approach for Governments: Micro-Segmentation
sponsored by Unisys
WHITE PAPER: Explore the power of a new security strategy, micro-segmentation. Learn now about the components of this strategy and how they address data protection challenges for today's governments.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Unisys

Data Visualization. The What, Why and How
sponsored by SAS
WHITE PAPER: Data visualizations can help your organization tremendously when it comes to finding and eliminating cyberthreats deep within your organization. Discover how to not only detect and block attacks in minutes, but also get insight from these attack locations to better protect against emerging trends and anticipate signs of threats.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

UBM Dark Reading: Close the Detection Deficit with Security Analytics
sponsored by SAS
WHITE PAPER: Discover how to collect and correlate data from multiple sources, separate relevant data from irrelevant, and apply context to the data to extract meaningful value from data analysis. Mitigate threats faster than ever and learn the 5 essential characteristics of a security analytics solution.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS
51 - 75 of 1106 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement