Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software White Papers (View All Report Types)
76 - 100 of 344 Matches Previous Page  |  Next Page
Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities
sponsored by IBM
WHITE PAPER: The business world has been increasingly mobile for years, but it hasn't been until now that cyberthreats have been aimed at mobile devices. Unified endpoint management has come to integrate augmented intelligence and cognitive technology. Access this white paper to learn how these two technologies are improving mobile security.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

IBM

Improving Application Security and Performance With Cloud Firewalls
sponsored by Akamai
WHITE PAPER: This whitepaper dives into the biology of web and DDoS attacks. Learn how a suite of systems can provide you with a cloud-based web application firewall to protect your infrastructure from any threat.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Akamai

Hybrid Active Directory Security and Governance for Microsoft 365
sponsored by Quest
WHITE PAPER: In this white paper, learn about a software that lets you improve your hybrid AD security for Microsoft 365 by helping you assess, detect threats, mitigate damage, and recover your information to help you stay more productive.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

Quest

Your Guide to Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER: As mobile devices play a greater role in corporate computing and employees become more reliant on them, new security challenges emerge and existing ones become more complex. Access this white paper to discover how the risk of unauthorized access to mobile devices adds new requirements for user authentication.
Posted: 28 Mar 2017 | Published: 24 Mar 2017

HID

Secure Identity Experience in the Age of Connected Everything
sponsored by HID
WHITE PAPER: Discover how industry expert Christian Christiansen of IDC views security in the age of mobile workforces, smartphone apps, and cloud-based corporate information.
Posted: 24 Mar 2017 | Published: 31 May 2016

HID

Reduce the Number of Ransomware Infections Across Your Organization
sponsored by Cisco Umbrella and Dimension Data
WHITE PAPER: Ransomware is becoming a bigger threat every quarter. Learn what ransomware truly is and how it works, as well as what can be done to mitigate its threat to your organization.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco Umbrella and Dimension Data

Investigating Surprise Attacks at the Application Layer: Bad Bot Report
sponsored by Distil Networks
WHITE PAPER: Bad bots can do everything from maliciously scraping data from sites without permission to undertaking criminal activities, such as fraud and outright theft. Access this report to gain a unique, focused view on bad bot activity at the application layer (layer 7 of the OSI model).
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Distil Networks

Defining Modern Hybrid Security: Enable Cloud-powered Data Protection
sponsored by Amazon Web Services
WHITE PAPER: With the blisteringly fast pace of change in cloud data protection, settling for architecture that doesn't provide what organizations are seeking is a death knell for data security. In this ESG report learn what, how, and why a hybrid cloud architecture could be right for your enterprise's data security needs.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

Amazon Web Services

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Your Guide to the 2016 Global Threat Intelligence Report
sponsored by Cisco Umbrella and Dimension Data
WHITE PAPER: Security isn't just beating today's threats: It's a matter of preparing for future threats and mitigating their effects. Dive into this global threat intelligence report and learn how to leverage deep insight into lessons learned from 2016 and 2015, what weaknesses the industry has yet to rectify, what hackers are targeting and where, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

Top IT Trends in 2017: Cybersecurity
sponsored by Cisco Umbrella and Dimension Data
WHITE PAPER: With so many enterprises making the transition to digital business, the entire landscape of cybersecurity has shifted and morphed dramatically over the past year. This list will delve into 5 top IT trends that will shape 2017 and beyond as it pertains to cybersecurity, the digital transformation, identity, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID
WHITE PAPER: Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

5 Reasons Why Mobile Will Transform Enterprise Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Entrust, Inc.

The Rise of the Secure Internet Gateway
sponsored by Cisco Umbrella and Dimension Data
WHITE PAPER: With the responsibility of preventing and mitigating the damage of breach risks falling heavily on the shoulders of IT pros, the reality of the cloud, a mobile workforce, and borderless networks can make their job seem nearly impossible. In this white paper learn how to change the game's rules when it comes to better protecting today's workforce.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco Umbrella and Dimension Data

How to Prevent Attacks from Ever Breaching You in the First Place
sponsored by Cisco Umbrella and Dimension Data
WHITE PAPER: Discover how today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection, and why it's now essential to adopt new measures that predictively neutralize these modern threats.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco Umbrella and Dimension Data

5 Ways to Securely Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: Discover what the digital transformation means to you, how you can capitalize on it, and how to keep your data secure in a future where borderless networks like the cloud and the connectivity of the IoT are bringing us closer together every day.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Entrust, Inc.

Combat Today's Threats with A New Approach to Security
sponsored by Fortinet, Inc.
WHITE PAPER: An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack lifecycle. In this white paper learn how to address today's threat trends by thinking about security in a new way.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Fortinet, Inc.

Simplifying & Securing Your Cloud Apps Deployment
sponsored by Entrust, Inc.
WHITE PAPER: With an increasing number of internal, external, and self-propagating threats, your organization needs a better way for deploying cloud-based authentication. Learn how to achieve authentication success using SSO technology, gain highly efficient provisioning, and more.
Posted: 20 Mar 2017 | Published: 20 Mar 2017

Entrust, Inc.

Accelerating Business Transformation with Effortless Authentication
sponsored by Entrust, Inc.
WHITE PAPER: In this white paper learn how to attain enterprise-grade authentication and enable bold digital business strategies via foundational security.
Posted: 17 Mar 2017 | Published: 17 Mar 2017

Entrust, Inc.

Understanding the IoT Explosion and Its Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Fortinet, Inc.

Application Security Testing Vendors: Analyzed and Graded
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this Gartner research report learn the importance of various vendors in the application security testing field, how this impacts the greater application security landscape, and more.
Posted: 16 Mar 2017 | Published: 28 Feb 2017

Hewlett Packard Enterprise

Trusted Identities: An Imperative for Digital Transformation
sponsored by Entrust, Inc.
WHITE PAPER: Learn how with a trusted identity, enterprises can be bold, but without it, they limit the business potential and the level of innovation through newly introduced risks.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Entrust, Inc.

How to Achieve Stronger Information Security
sponsored by Iron Mountain
WHITE PAPER: Find out just how important paper is to data privacy and the risks created from ignoring it. Plus, uncover a free guide to help you achieve stronger information security.
Posted: 16 Mar 2017 | Published: 25 Jan 2016

Iron Mountain

Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER: This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Encrypt Everything: How to Unshare and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER: Learn how to find a way to balance critical business needs and requirements for data-driven initiatives while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto
76 - 100 of 344 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement