Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software White Papers (View All Report Types)
101 - 125 of 403 Matches Previous Page  |  Next Page
Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Discover recommendations towards a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively. Access now for the 4 key steps to kidnap-proof your data.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix

Bridging the Gap Between IT Operations & Security
sponsored by Splunk
WHITE PAPER: Click inside and explore the legitimate differences between security and IT operations, as well as where they share some common ground, and how you can make use of these shared values to build a safer, more available network.
Posted: 17 May 2017 | Published: 17 May 2017

Splunk

Cloud DDoS Protection Service – Protecting AWS-Hosted Applications
sponsored by Radware
WHITE PAPER: Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Radware

Your Endpoint Essentials Checklist
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover a comprehensive checklist to ensure that your endpoints have essential features to protect your enterprise from ransomware and other malicious activities.
Posted: 16 May 2017 | Published: 16 May 2017

Symantec & Blue Coat Systems

Global Study on the Risk of Outdated Technologies
sponsored by Citrix
WHITE PAPER: Discover global trends in IT security risks and reasons why security practices and policies need to evolve to deal with threats from disruptive technologies, insider risk and compliance.
Posted: 15 May 2017 | Published: 28 Feb 2017

Citrix

How Technology helps with the reporting burden-KPMG
sponsored by Tagetik Software
WHITE PAPER: Discover how to maximize your CFO's greatest opportunities to contribute to or impact the value of the organization by leveraging EPM.
Posted: 11 May 2017 | Published: 11 May 2017

Tagetik Software

Understanding and Mitigating DDoS Attacks
sponsored by Dyn
WHITE PAPER: Discover a number of DNS DDoS attack concepts and mitigation strategies and learn the critical role DNS plays in the performance of your online business, common types of DDoS attacks, best practices to protect your DNS infrastructure against DDoS attacks, and more.
Posted: 11 May 2017 | Published: 11 May 2017

Dyn

6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Discover a detailed showcase of the 3 steps on the path to building up your organization's application security maturity.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: Discover a step-by-step rundown of what you need to know to implement an advanced application security program successfully.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Cybersecurity: Turning Threat Data Into Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn how real-time DNS observations improve the accuracy and response time to cyberattacks and how to use passive DNS to escalate the discovery and accelerate the investigative timeline.
Posted: 08 May 2017 | Published: 08 May 2017

Farsight Security

Not All Machine Learning Is Created Equal
sponsored by Cylance
WHITE PAPER: Discover how to apply machine learning to your organization's endpoint security and achieve unprecedented efficacy rates, minimal consumption of system resources, exceptional attack prevention speed, and more.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Navigating the NY Dep. of Financial Services' Cybersecurity Regulations
sponsored by Veracode, Inc.
WHITE PAPER: Discover the 5 minimum requirements for NYDFS compliant cybersecurity programs, and what it means that these regulations require each company to assess its specific risk profile and design a program that addresses its risks in a "robust" fashion.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Combating the Top 4 Sources of Vulnerabilities
sponsored by Veracode, Inc.
WHITE PAPER: Vulnerability software is leading to security breaches. Learn how to combat the top four sources of application software vulnerabilities.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

SPLUNK® SOFTWARE AS A SIEM
sponsored by Splunk
WHITE PAPER: Learn a new approach to SIEM that will give your organization the ability to combat the modern threat landscape and secure its data, all from a single pane of glass.
Posted: 04 May 2017 | Published: 04 May 2017

Splunk

Your Guide to Content Filtering for Mobile
sponsored by Wandera
WHITE PAPER: Explore the benefits of content filtering and analyze the challenges, questions and considerations involved in the implementation of content filtering across a mobile fleet.
Posted: 04 May 2017 | Published: 04 May 2017

Wandera

6 Vendor Risk Assessment Resource Drains to Avoid
sponsored by Rsam
WHITE PAPER: Discover 6 ways your organization may be allocating resources unnecessarily in remediating vendor risk.
Posted: 04 May 2017 | Published: 04 May 2017

Rsam

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Five Tips For Your GRC Risk Scoring System
sponsored by Rsam
WHITE PAPER: Discover 5 tips to improve your enterprise's governance, risk and compliance scoring system so that you can standardize reporting, streamline workflows, communicate risk clearly to stakeholders and more.
Posted: 03 May 2017 | Published: 03 May 2017

Rsam

Security Use Case Detecting Unknown Malware
sponsored by Splunk
WHITE PAPER: Learn how to gain significant power over understanding detailed activities on endpoint as well as the ability to detect advanced and unknown malware activities.
Posted: 03 May 2017 | Published: 03 May 2017

Splunk

A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black
101 - 125 of 403 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement