IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Security Breaches White Papers (View All Report Types)
 
Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Appthority

Are You Confident or Complacent About Your Security?
sponsored by Absolute
WHITE PAPER: In this report, uncover the survey results of over 500 IT security professionals and what they believe is the biggest threat to organizations today, confessions on what really goes on in enterprise IT, and more.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Absolute

Endpoint Security Suites: How 15 Providers Stack Up
sponsored by Trend Micro
WHITE PAPER: In this 25-criteria evaluation of endpoint security suite providers, one firm has identified 15 significant game-changers. Uncover research, analysis, and scores for how each provider measures up so you can make the right choice.
Posted: 21 Nov 2016 | Published: 19 Oct 2016

Trend Micro

Evolving Threats Call For Integrated Endpoint, Comprehensive Security Strategies
sponsored by Trend Micro
WHITE PAPER: IT departments have increasingly prioritized preventing, detecting, and controlling threats. Learn why your peers believe this interconnected threat mitigation structure is important, and how this sentiment is increasing across the enterprise.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

Trend Micro

7 Ways to Simplify Security Intelligence so Your Team Can Work Smarter, Not Harder
sponsored by LogRhythm, Inc.
WHITE PAPER: With automated response, your analysts can review the situation before countermeasures are executed, while at the same time greatly reducing mean time to respond. In this resource, you'll uncover 7 best practices for getting security intelligence technology to work harder, so people can work smarter.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

LogRhythm, Inc.

An MSP's Guide to selling IT Security
sponsored by LogicNow
WHITE PAPER: By enhancing your security capabilities, you can add additional value to your offerings. Learn how to evolve into a Managed Security Service Provider (MSSP) and enable various security strategies that complement each other.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

LogicNow

Enterprise Security Gets Adaptive
sponsored by Kaspersky Lab
WHITE PAPER: This paper explores how to implement a more adaptive, integrated approach to security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help you defend against advanced persistent threats (APTs).
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

The business of Ransomware: What every CXO should know
sponsored by Code42
WHITE PAPER: Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Code42

Best Practices for Securing Microsoft Azure Hybrid Clouds
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses the best practices for securing your Microsoft Azure Cloud environment. Learn how to provide uncompromising protection against even the most sophisticated cyberattacks now.
Posted: 09 Nov 2016 | Published: 31 May 2016

Check Point Software Technologies Ltd.

Building Natural Active Immunity against Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, companies can strengthen their defenses against advanced and unknown threats. Discover how you can build this natural active immunity with Fortinet.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement