Standards  >  

Security Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Security Protocols White Papers (View All Report Types)
 
Perspective: The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records savings, workforce hours, and streamlined workloads.
Posted: 17 Aug 2016 | Published: 25 Jul 2016

Infor

DDoS Attack Cybersecurity for 2017
sponsored by Neustar
WHITE PAPER: Learn about the modern DDoS landscape, what to expect from future trends, and how to keep the lessons learned from last year's attacks primed and ready to keep your organization safe.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

Neustar

Your Blueprint to Securing Your Public and Hybrid Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper and discover how you can securely scale protection to your cloud infrastructure and workloads, and segment both within the cloud and between endpoints, enterprise networks, and the cloud to keep your data safe.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast North America
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 03 Jan 2017 | Published: 21 Jul 2016

Mimecast North America

Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.
Posted: 29 Aug 2016 | Published: 31 Jul 2016

Distil Networks

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Five Important Truths About Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper discover 5 steps to meeting digital workspace security objectives, and taking a people-centric approach to security that doesn't come at the cost of productivity or user experience.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

RES Software

Threat Intelligence Platforms: A Research Report
sponsored by AlienVault
WHITE PAPER: Find how a social media-esque, community-focused approach to threat intelligence has proven to be effective at identifying and analyzing emerging threats.
Posted: 17 Nov 2016 | Published: 12 Oct 2016

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement