IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems White Papers (View All Report Types)
1 - 25 of 545 Matches Previous Page  |  Next Page
Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Top 10 Considerations for Securing Private Clouds
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers 10 considerations for improving private cloud security to keep cybercriminals out and away from your data.  Access now to learn valuable security insights.
Posted: 30 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Rethinking Data Protection for MSPs
sponsored by Datto, Inc.
WHITE PAPER: This white paper examines the magnitude of data protection challenges as well as solutions to mitigate risks for consumers in any environment.
Posted: 27 Mar 2015 | Published: 25 Feb 2015

Datto, Inc.

3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline and enhance your risk management strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

Why Every IT Security Team Needs Anomaly Detection Software
sponsored by Prelert
WHITE PAPER: This white paper gives you the ins and outs of anomaly detection, including how it works and what its benefits are.
Posted: 25 Mar 2015 | Published: 31 Dec 2014

Prelert

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: This survey reveals how IT professionals view effective executive involvement in threat mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

The Secret To Finding Unknown IT Security Threats
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how predictive analytics and adaptable machine learning can enhance your security and protect you from even the worse threats.
Posted: 24 Mar 2015 | Published: 18 Mar 2014

Prelert

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Case Study: Finding Document Thieves
sponsored by Prelert
WHITE PAPER: In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.
Posted: 23 Mar 2015 | Published: 16 Jan 2015

Prelert

Anomaly Detection in Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER: A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Veracode, Inc.

Advanced Threat Protection
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

How to Improve Your Threat Intelligence
sponsored by Threatstream
WHITE PAPER: This white paper discusses those problems and how threat intelligence is evolving to fix them.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Threatstream

Unified Communications Security Measures: Ensuring Peace of Mind
sponsored by ThinkingPhones
WHITE PAPER: This white paper discusses the essential security features all unified communications should have.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones

South Washington Co. Schools: redefining the network
sponsored by Hewlett-Packard Limited
WHITE PAPER: As a result of the exponential growth in wireless devices, South Washington County Schools needed an easier way to maintain security and manage both wired and wireless networks. Read this case study to learn more about the structure the school implemented to improve security.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Hewlett-Packard Limited

Data masking everywhere
sponsored by IBM
WHITE PAPER: Read this white paper now to learn how data masking can protect your sensitive information from hackers.
Posted: 16 Mar 2015 | Published: 31 May 2014

IBM
1 - 25 of 545 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement