IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management White Papers (View All Report Types)
 
The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Effective Incident Response Through User Activity Monitoring
sponsored by Veriato, Inc.
WHITE PAPER: The longer a cyber incident remains undiscovered, the more likely it will be that the organization will realize a significant data breach. Explore how to achieve effective incident response through user activity monitoring.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Veriato, Inc.

Cloud DDoS Protection Service – Protecting AWS-Hosted Applications
sponsored by Radware
WHITE PAPER: Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Radware

What Every Organization Needs to Know Before, During, and After a Ransomware Attack
sponsored by Proofpoint, Inc.
WHITE PAPER: This guide helps you defend against phishing emails, vulnerabilities in mobile devices, and infected websites. Assess your organization's ability to prevent, respond to, and remediate attacks with a ransomware survival checklist.
Posted: 02 May 2017 | Published: 02 May 2017

Proofpoint, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

Improve Your Threat Intel Capabilities
sponsored by Bayshore Networks
WHITE PAPER: Learn how to deploy comprehensive threat intel protection and enablement capabilities, gaining a policy engine that automatically converts threat intel feeds into actionable policy, and more.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.

Market Trends: Automation and Integration Critical to Application Security Tool Adoption
sponsored by IBM
WHITE PAPER: Take a closer look at this market trend report to reveal findings from Gartner research surveys regarding organizations' use of DevOps and security.
Posted: 20 Sep 2017 | Published: 17 Jan 2017

IBM

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement