IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems White Papers (View All Report Types)
101 - 125 of 580 Matches Previous Page  |  Next Page
Fighting Emerging Cyber-Attacks with a Holistic Security Architecture
sponsored by Radware
WHITE PAPER: This white paper outlines a holistic security architecture strategy designed to fight complex and dynamic attack campaigns. Access now to learn how to explore four attack cases and how to defend against them.
Posted: 31 Mar 2015 | Published: 09 Apr 2014

Radware

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Top 10 Considerations for Securing Private Clouds
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers 10 considerations for improving private cloud security to keep cybercriminals out and away from your data.  Access now to learn valuable security insights.
Posted: 30 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Rethinking Data Protection for MSPs
sponsored by Datto, Inc.
WHITE PAPER: This white paper examines the cloud data protection challenges facing businesses today and explains how you can better keep your customers' data secure.
Posted: 27 Mar 2015 | Published: 25 Feb 2015

Datto, Inc.

3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

Anomaly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WHITE PAPER: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Published: 24 Jan 2015

Prelert

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover survey results that reveal how IT pros feel about leadership and executive involvement in breach mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Stop Advanced Threats Before They Can Hurt You
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

Unified Communications Security Measures: Ensuring Peace of Mind
sponsored by ThinkingPhones
WHITE PAPER: This white paper discusses the essential security features all unified communications should have.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones

"IDC survey data suggests managed SIEM solutions are worth a lookIDC data suggests managed SIEM can offer better security than internal IT 60% of organizations say managed SIEM solutions improve security over internal IT"
sponsored by Alert Logic
WHITE PAPER: In this white paper, explore how SIEM systems close visibility gaps. Learn how to choose the right platform for your organization and maximize the benefits today.
Posted: 17 Mar 2015 | Published: 05 Nov 2014

Alert Logic

Breach Detection: 6 quick tips to strengthen your response plan
sponsored by Alert Logic
WHITE PAPER: This guide tells you the 6 essential steps needed for successful incident response.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

ROI Analysis: How to reduce security risks and labor related costs
sponsored by Alert Logic
WHITE PAPER: This economic impact report analyzes one effective risk management solution to give you an accurate assessment of that product's ROI.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Log Management Fundamentals
sponsored by Alert Logic
WHITE PAPER: This brief guide gives you a quick and clear outline of the fundamentals of log management and the log collection sources you need to have.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Alert Logic

Learn what to include in a proactive threat management program
sponsored by Alert Logic
WHITE PAPER: This handy resource gives you the ten steps to successful threat management.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Accurate, Effective Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper describes an example of an airtight fraud prevention system.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Back to Basics: Securing Business Information on the Cloud
sponsored by Box
WHITE PAPER: View this white paper to learn how the cloud can enable us to go back to security basics to manage distributed computing.
Posted: 25 Feb 2015 | Published: 04 Feb 2015

Box
101 - 125 of 580 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement