IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsWhite Papers (View All Report Types)
126 - 150 of 455 Matches Previous Page  | Next Page
Cybersecurity Imperitives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

A New Security Approach for Today's Advanced Attacks
sponsored by FireEye
WHITE PAPER: This paper examines the limitations of existing security solutions, and several security architectures, including sandbox-based products that can truly protect against today's advanced attacks.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

FireEye

Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals
sponsored by FireEye
WHITE PAPER: This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

FireEye

Detecting Sophisticated Online Attacks with Streaming Analytics
sponsored by EMC Corporation
WHITE PAPER: Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

EMC Corporation

Implementing a Security Analytics Architecture
sponsored by EMC Corporation
WHITE PAPER: This guide explores the inabilities in traditional security management and how advanced threats are growing even more sophisticated.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

EMC Corporation

The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER: This white paper describes the 10 most common mistakes, strategic and technical, that incident response teams make – and their impact. Read on to learn how to avoid them with a well-defined incident response plan.
Posted: 12 Mar 2014 | Published: 31 Dec 2013

FireEye

Taking a Lean-Forward Approach to Combat Today's Cyber Attacks
sponsored by FireEye
WHITE PAPER: This white paper highlights why organizations need much more than fundamental security tools and strategies for dealing with advanced targeted attacks.
Posted: 12 Mar 2014 | Published: 31 Dec 2013

FireEye

Attacks on Point of Sales Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Mobile Security: How to Protect the Enterprise in the Mobile Era
sponsored by Dell Software
WHITE PAPER: Learn about the three pillars of mobile security, and how they give users the flexibility and access they need while providing a strong foundation that protects systems and data.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

The Importance of Securing Mobile Device Platforms
sponsored by Dell Software
WHITE PAPER: Access this informative resource to discover which mobile security solutions are recommended for Apple, Android and Microsoft Windows devices.
Posted: 11 Mar 2014 | Published: 30 Sep 2013

Dell Software

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013

FireEye

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

FireEye

New Security Challenges for State and Local Governments
sponsored by FireEye
WHITE PAPER: This white paper explores the current threat landscape and why traditional tools fail to detect advanced attacks.
Posted: 10 Mar 2014 | Published: 31 Dec 2013

FireEye

Sophisticated Attacks - The Four Things you Can do now to Help Keep Your Organization Safe
sponsored by IBM
WHITE PAPER: This guide takes a look at IT staff shortages and how managed security services providers (MSSPs) can help minimize issues with the technical skills dilemma.
Posted: 10 Mar 2014 | Published: 31 May 2013

IBM

Combat the Latest Security Attacks with Global Threat Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
Posted: 06 Mar 2014 | Published: 30 Sep 2013

IBM

SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization
sponsored by FireEye
WHITE PAPER: Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

FireEye

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 06 Mar 2014 | Published: 01 Feb 2014

IBM

Advantage FireEye Debunking the Myth of Sandbox Security White Paper
sponsored by FireEye
WHITE PAPER: This guide debunks the myth of effective sandbox security and outlines inefficiencies within this popular strategy.
Posted: 06 Mar 2014 | Published: 31 Dec 2013

FireEye

The Need for Speed: 2013 Incident Response Survey
sponsored by FireEye
WHITE PAPER: In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on the top security threats for global organizations in 2013.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

FireEye

EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER: Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011

IBM

Manage data security and application threats with a muli-tiered approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye
126 - 150 of 455 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement