IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems White Papers (View All Report Types)
126 - 150 of 652 Matches Previous Page  |  Next Page
Fighting the Latest Evolution of Money Laundering
sponsored by BAE Systems
WHITE PAPER: This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.
Posted: 08 Mar 2017 | Published: 31 Dec 2016

BAE Systems

6 Steps to Proactive Cybersecurity Protection
sponsored by BAE Systems
WHITE PAPER: Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Advanced Detection of Existing, New and Evolving Cybersecurity Threats
sponsored by BAE Systems
WHITE PAPER: According to security experts, SIEM is currently catching less than 1% of successful advanced threats. Learn how to go beyond SIEM and discover how to incorporate a data platform with advanced threat analytics, big data capabilities, and an investigation console into your cybersecurity strategy.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Identifying TTPs with threat intelligence With Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Learn the finer points of knowing how to counter the tactics, techniques, and procedures (TTPs) of a malicious attacker. Uncover the value of identifying attacker TTPs and understanding information source types to ultimately improve relevant and timely intelligence reporting.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Threat Intelligence Reveals Secrets: From the Surface to the Dark Web
sponsored by Recorded Future
WHITE PAPER: Learn how the deep web, and by extension the dark web, are closer to the surface web that you most likely enjoy every day. Discover what we can learn from the connections between the three and what it means for your organization's security policy.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Intelligent Security Operations: A How-To Guide
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find your roadmap for implementing an intelligent, analytics-driven security operations center in this white paper. Discover how to gain visibility into your organization to detect and respond to existing and new threats.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Hewlett-Packard Enterprise

Do You Know Who I Am? Know Your Customer Systems Market Update
sponsored by BAE Systems
WHITE PAPER: Explore how Know Your Customer (KYC) systems provide organizations with the processes and workflows they need to assess the risk customers pose both at account opening and over time. Learn how to leverage KYC to boost customer onboarding and due diligence, improve risk management, integrate AML with KYC systems, and more.
Posted: 02 Mar 2017 | Published: 31 Aug 2016

BAE Systems

How Effective is Your AML Auditing?
sponsored by BAE Systems
WHITE PAPER: This white paper explores how to implement strong, comprehensive anti-money laundering (AML) audit processes to help you identify and prevent financial threats. Discover what defines an effective AML audit model, how to prep your AML audit, how to overcome AML audit challenges, and more.
Posted: 02 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Comparing SIEM, Big Data, and Behavior Analytics
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how SIEM can effectively secure your organization's logs where big data can fail. Discover the components of effective and mature SIEM, SIEM's correlation with security context, scaling security detection, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Hewlett-Packard Enterprise

Embrace Risk: Secure Your Hybrid Cloud
sponsored by HPE and Intel®
WHITE PAPER: Learn how to secure your hybrid cloud by treating security as something that should be built into the IT cloud strategy and its design from the very beginning.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

HPE and Intel®

Your Guide to Spotting and Preventing Malware Infection
sponsored by Solarwinds MSP
WHITE PAPER: Learn about the types of attacks facing a typical network and uncover some successful mitigation strategies IT professionals have implemented to protect their networks.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Solarwinds MSP

Secure Your Email Against Targeted Phishing Attacks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to ensure your email is protected against phishing attacks. Discover not only what to look for in threats coming in, but also how to tackle sophisticated email security challenges.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Managing the Risks of Cryptocurrency
sponsored by BAE Systems
WHITE PAPER: This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

BAE Systems

Fine-Tune Money Laundering Detection Tools with Analytics, Machine Learning
sponsored by BAE Systems
WHITE PAPER: Discover how to improve money laundering detection with analytics and machine-learning that can help you fine-tune anti-money laundering (AML) tools and test, simulate, and export AML models.
Posted: 28 Feb 2017 | Published: 03 Jan 2017

BAE Systems

3 Steps to Improving Incident Response
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn why 68% of companies want incident response tools that can detect and fully assess threats that infiltrate from an array of devices and geographies.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

The new EUsecurityrequirements and you
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Viewpoints and Vendor Comparisons: Access Management and ID Federation
sponsored by IBM
WHITE PAPER: In this market report, learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Also gain rare insight into product ratings, vendor coverage, leaders in the field, and more.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

Protect Your Critical Assets with Identity Governance and Intelligence
sponsored by IBM
WHITE PAPER: Learn how integrating policy and governance controls with identity management processes would help your organization understand, control, and make better business decisions related to access and risk.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 tips on how to keep your data safe in the cloud. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Symantec & Blue Coat Systems

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Busting the Myth of the Malware “Silver Bullet”
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

McAfee, Inc.
126 - 150 of 652 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement