Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software White Papers (View All Report Types)
1 - 25 of 247 Matches Previous Page  |  Next Page
The Security Fabric of The Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.
Posted: 22 Sep 2016 | Published: 22 Apr 2016

Fortinet, Inc.

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Automated Malware Analysis Tools and Technology: The Security Architecture and Operations Playbook
sponsored by Palo Alto Networks
WHITE PAPER: The following report features a 36-criteria evaluation of automated malware analysis providers. Discover ways each provider measures up so you and your team can make the right choice.
Posted: 20 Sep 2016 | Published: 21 Apr 2016

Palo Alto Networks

Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Report: The Impact of Security Threats on Business
sponsored by Radware
WHITE PAPER: In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise
sponsored by Radware
WHITE PAPER: Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Proofpoint, Inc.

Allow Your Enterprise Greater Mobile App Security
sponsored by MobileIron
WHITE PAPER: This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

MobileIron

Microsoft Office 365: Enabling More Secure Collaboration
sponsored by VMware, Inc.
WHITE PAPER: Learn how you can best take control of Office 365's anytime-anywhere collaboration while also maintaining secure access to corporate data. Explore three steps designed to help you realize this goal quickly and securely.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

VMware, Inc.

Mobile Malware Hits Active Sync-Only Devices
sponsored by MobileIron
WHITE PAPER: Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

How One SIEM Strategy Stacks Up
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource takes a look at one SIEM strategy and rates its features, performance, documentation, support, and value. Access now to determine if it's time for your organization to consider a different approach to SIEM technology.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

LogRhythm, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Customize Email Security in a Private Cloud
sponsored by Intermedia
WHITE PAPER: Learn what managed public cloud, private cloud and hybrid cloud models can do for your organization's email security – as well as the criteria for choosing the one that's right for you. Access now to specifically uncover the benefits of a Dedicated Hosted Exchange.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Intermedia

Faster Payments: Help Detect and Prevent Fraud While Speeding Up Financial Processing Times
sponsored by IBM
WHITE PAPER: Discover how faster payment processing can provide cybercriminals a quick getaway vehicle and how you can adapt your fraud detection processes for this new era. Learn how counties like the UK, Singapore, Nigeria, and others have near-instantaneous banking and have learned over the years how to combat the threat of fraud.
Posted: 02 Sep 2016 | Published: 31 Jul 2016

IBM

SIEM Software Gives Companies Insight into Both Security and Business Operations
sponsored by LogRhythm, Inc.
WHITE PAPER: SIEM software has come a long way in the past decade, and continues to prove its worth by evolving to rise up against cybercrime. Access this resource to learn more about the increasing effectiveness of SIEM tools.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

LogRhythm, Inc.

Incident Response Capabilities in 2016
sponsored by LogRhythm, Inc.
WHITE PAPER: As the attacker's landscape has changed, organizations have started to respond and are realizing they must respond quickly. Discover how the results of a 2016 incident response survey show a need for more efficient incident response teams, and learn what you can do to improve yours.
Posted: 01 Sep 2016 | Published: 30 Jun 2016

LogRhythm, Inc.

How to Secure Cloud Applications & Services
sponsored by Blue Coat Systems
WHITE PAPER: Discover the major points of an enterprise's transition to the cloud, and what they can do to make it a profitable and secure one. Learn about the shift in workloads, the evolution in the security stack, the challenges of deep visibility, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

Safely Adopting Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to shore up your security measures to cover the gaps left by Office 365. Learn not only about the gaps themselves, but also what their ramifications are on a wider scale, how to take a wide angle viewpoint on the issues, how to stay compliant, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

Worried About Mobile Security? You Should be
sponsored by IBM
WHITE PAPER: Learn the importance, growth, and lethal significance of mobile security threats. Uncover why malware has exploded out of its infancy with a vengeance, how built-in security controls from vendors won't protect mobile devices, why fraudsters can effectively "fly under the radar", and more.
Posted: 01 Sep 2016 | Published: 31 Jul 2016

IBM

Secure your Mobile Enterprise
sponsored by Unisys
WHITE PAPER: How can organizations better secure their mobile environment to confidently secure access from employee-owned or third party mobile devices? Access this white paper and discover a new, innovative security approach that can secure the entire data path and conceal endpoints.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Unisys

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Fortunately, it's possible for organizations with limited budgets and higher risk tolerances to achieve significant improvements in security maturity. Discover ways to adopt mature capabilities by building an integrated architecture.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

Applied Behavior Analytics: Don't Be an Outlier!
sponsored by Distil Networks
WHITE PAPER: In this 451 Research report excerpt, explore the implications of applied behavior analytics (ABA) on today's security landscape. Learn about the ABA market, the different types of behavior analytics, insider monitoring systems and more. Plus, get recommendations on how you can proceed with ABA.
Posted: 30 Aug 2016 | Published: 30 Jun 2016

Distil Networks

Mission-Critical Mobile Security: A Stronger, Sensible Approach
sponsored by Unisys
WHITE PAPER: This white paper shares a unqiue, innovative approach to help organizations address today's mobile security vulnerabilities and the security risks associated with BYOD. Uncover highlights for a reliable mobile security strategy that follows the user and is not limited to one device.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

Unisys

Simplifying PCI DSS Compliance
sponsored by Unisys
WHITE PAPER: Through their research, the security experts at ControlScan have found that organizations are more successful with PCI compliance when they address PCI scope reduction early in the IT management cycle. Access this white paper that provides ControlScan's assessment of one software-based security solution that can reduce PCI DSS scope.
Posted: 30 Aug 2016 | Published: 30 Jun 2016

Unisys
1 - 25 of 247 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement