IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security ThreatsWhite Papers (View All Report Types)
 
Have Control Over Remote Access—It's Time to Deploy New Laptops
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals several helpful tips surrounding the secure deployment of new laptops.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc. and Windows 8 Pro

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

Needle in a Datastack: The Rise of Big Security Data
sponsored by Intel Security
WHITE PAPER: Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Leverage Security Event Data to Improve Vulnerability Detection & Remediation
sponsored by Intel Security
WHITE PAPER: Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data for better and more accurate reporting.
Posted: 09 Sep 2014 | Published: 31 Oct 2013

Intel Security

Weighing Risk Against the Total Cost of a Data Breach: Can You Afford a Web Application Layer Attack?
sponsored by Akamai Technologies
WHITE PAPER: This white paper presents a proven, industry-standard approach to determining a company's risk of web application cyber-attacks. The provided equation can help you justify the cost of proactively deploying cybersecurity products and services to protect against web application attacks, including those that could lead to data breaches.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM

Piercing the Veil of Masked Cyber Criminals
sponsored by DomainTools
WHITE PAPER: In this helpful white paper, discover a new security solution that can help you identify cyber criminals, build a cyber-attack profile, and more effectively protect your valuable data and assets.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Three Kinds of Chaos: Establishing collaboration and control in a chaotic world
sponsored by Clearswift
WHITE PAPER: This white paper reveals why collaboration and control are both equally important, especially with evolving security threats.
Posted: 15 Oct 2014 | Published: 01 Mar 2014

Clearswift

A Provactive New Approach to Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: In this informative white paper, discover a new integrated vulnerability assessment and security intelligence solution that can enhance vulnerability insights and improve security efficiency.
Posted: 12 Sep 2014 | Published: 31 Jul 2013

IBM

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement