IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Threats White Papers (View All Report Types)
Evaluating the Next Generation of Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper looks at a next-generation threat prevention tool, evaluating the effectiveness of this form of technology and the practicality of implementing it.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Check Point Software Technologies Ltd.

It's Not You, It's Me: Understand the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Review the top 3 threats to public cloud environments in order to craft your security strategy to mitigate malware. Explore the shared security responsibility model to learn what steps you need to take to avoid falling victim to data breaches.
Posted: 26 Oct 2015 | Published: 11 Feb 2015

Alert Logic

Concern for Accidental and Malicious Data Breaches for Data Stored in New Zealand
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on New Zealand and uncovered the fact that most New Zealanders were just as concerned about accidental security breaches as they were with malicious attacks. What other key concerns were there? Download today and find out the facts.
Posted: 29 Sep 2015 | Published: 31 Dec 2014


Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014


Leverage the Global Threat Community to Prevent Unknown Threats with the Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will discover how to reduce your attack surface and block all known and unknown threats with a threat intelligence cloud platform. Access this advice now to detect unknown threats and convert them into known, stoppable threats.
Posted: 15 Oct 2015 | Published: 15 Oct 2015

Palo Alto Networks

The Economy of Security
sponsored by IBM
WHITE PAPER: Explore a simple 3 step strategy to keeping informed with cybercriminal activity and protecting your organization from becoming the next data breach headline. View now and learn how to block attacks before they break through.
Posted: 10 Nov 2015 | Published: 31 Dec 2014


Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

Network Security and Regulatory Compliance Strategies
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this analyst report to find a four-step approach to focused, disciplined network security and sustaining requirements for regulatory compliance.
Posted: 06 Nov 2015 | Published: 06 Nov 2015

Hewlett Packard Enterprise

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by WhiteHat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to test your web apps' functions independently, automatically detect the presence of common nonce frameworks, and more.
Posted: 01 Oct 2015 | Published: 31 Dec 2013

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement