IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware Threats White Papers (View All Report Types)
 
Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Emergency Incident Response: 10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: Understand the top 10 common emergency incident response mistakes that organizations commonly make and how you can avoid making the same ones. Access now to prevent your enterprise from suffering from these shortcomings and ensure your current incident response practices are tested, effective and secure.
Posted: 06 May 2016 | Published: 31 Dec 2012

Intel Security

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
WHITE PAPER: To manage all things mobile, enterprise-wide security policies must be implemented. Learn how to improve mobile visibility with authorization and access policies that boast network privileges based on real-time contextual data, simple BYOD guest access, and more.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

A DevSecOps Playbook
sponsored by CloudPassage
WHITE PAPER: There is a fundamental struggle between the speed that cloud services provide and security. In this white paper discover the concept of DevSecOps, a departure from traditional thoughts about speed vs. security.
Posted: 19 Jul 2016 | Published: 31 Mar 2016

CloudPassage

The Advanced Threat Protection Buyer’s Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: Use the following checklist to help determine the strength of your security strategy. Access now and explore ways to make informed choices to move towards an integrated system of prevention, detection, and mitigation against advanced threats.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Mobility In Financial Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BlackBerry

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.

Move Your Email to the Cloud with Confidence
sponsored by Mimecast
WHITE PAPER: As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.
Posted: 24 May 2016 | Published: 24 May 2016

Mimecast

Top 10 Database Security Threats
sponsored by Dimension Data
WHITE PAPER: Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

Own Your Defense: Network-Based Security
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Many of the same things that drive business forward today are often the primary points of entry or vectors of attack that can damage your organization. Every new connection among your systems, employees, partners and customers is a potential point of vulnerability. Learn how to keep your business safe as threats grow.
Posted: 15 Mar 2016 | Published: 01 Mar 2016

Level 3 Communications, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement