Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software White Papers (View All Report Types)
26 - 50 of 186 Matches Previous Page  |  Next Page
Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: Today's cyber-threats are relentless, and they come in all forms. This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

Rethinking Security: Replacing the Traditional Firewall
sponsored by F5 Networks
WHITE PAPER: This white paper discusses how firewalls need to evolve in order to stay relevant and what you can do to embrace that evolution.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

F5 Networks

Protection from Targeted Attacks
sponsored by Mimecast
WHITE PAPER: This white paper introduces a comprehensive form of threat protection that will keep out even today's advanced hacks.
Posted: 11 Sep 2015 | Published: 31 Dec 2014

Mimecast

10 SIEM Platforms Tested for Security Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Special Report: 10 SIEM Technologies Reviewed
sponsored by LogRhythm, Inc.
WHITE PAPER: This report analyzes ten different SIEM technologies for risk management, threat detection, and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: Find out how you can avoid risk and gain complete visibility, no matter which cloud or virtual infrastructure you are using: public, private, hybrid, multi-cloud or virtualized data center. Learn how you can automate security and compliance for your infrastructure and feel confident you critical assets are protected.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Mobile Device Management for Retail
sponsored by IBM
WHITE PAPER: Access this white paper to learn about the new age of mobility in the retail space, as well as how to overcome security challenges with centralized device control, compliance, system updates, and disaster recovery.
Posted: 13 Jul 2015 | Published: 26 Dec 2014

IBM

Survey Results: The Value of a SIEM Platform
sponsored by IBM
WHITE PAPER: To ensure you're getting the most out of your SIEM system, you need to understand the value it brings your organization and users. This report presents an in-depth review of one SIEM platform based on survey responses provided by independent IT professionals.
Posted: 05 Jun 2015 | Published: 28 Feb 2014

IBM

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Cloud computing has introduced great security risks in the business world. Access this resource and discover ways to achieve data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

Content Collaboration: 5 Things to Look for in a Vendor
sponsored by IntraLinks, Inc
WHITE PAPER: This brief white paper presents the 5 key features of a successful content collaboration software service that can help you improve your collaboration security without breaking the bank or complicating business processes.
Posted: 20 May 2015 | Published: 20 May 2015

IntraLinks, Inc

Balancing Security and Mobility in the Financial Services Industry
sponsored by IBM
WHITE PAPER: Access this white paper now and discover how you can embrace IT consumerization and provide all of the security you need without sacrificing the benefits of mobility. Read on to learn how you can optimize your mobile strategy.
Posted: 28 Apr 2015 | Published: 26 Dec 2014

IBM

Why Every IT Security Team Needs Anomaly Detection Software
sponsored by Prelert
WHITE PAPER: In this white paper, you will discover the ins and outs of anomaly detection, used to actively prevent today's most pernicious cyber-attacks. Read on to learn the benefits network anomaly detection will deliver to your IT environments, and see how it can function as the "watchdog" for your IT security team.
Posted: 25 Mar 2015 | Published: 31 Dec 2014

Prelert

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper explains encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014

Lancope

The Secret To Finding Unknown IT Security Threats
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how predictive analytics and adaptable machine learning can enhance your security and protect you from even the worst threats.
Posted: 24 Mar 2015 | Published: 18 Mar 2014

Prelert

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER: This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

BitGlass

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast
26 - 50 of 186 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement