IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware Threats White Papers (View All Report Types)
 
Three-Pronged Approach to Improving Physical Security
sponsored by Modulo
WHITE PAPER: View this white paper to discover how to improve the physical protection of data through a three-pronged approach and how people, processes, and technologies can be used to minimize the disruption of information losses. Access now to learn more.
Posted: 02 Apr 2015 | Published: 04 Feb 2015

Modulo

Top Selection Criteria for an Anti-DDoS Solution
sponsored by Radware
WHITE PAPER: Access this white paper now for a comprehensive list of the questions you need to ask potential vendors before choosing their service.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

South Washington Co. Schools: redefining the network
sponsored by Hewlett-Packard Limited
WHITE PAPER: As a result of the exponential growth in wireless devices, South Washington County Schools needed an easier way to maintain security and manage both wired and wireless networks. Read this case study to learn more about the structure the school implemented to improve security.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Hewlett-Packard Limited

Protecting Critical DNS Infrastructure Against Attack
sponsored by Radware
WHITE PAPER: This white paper delves into the challenges of protecting DNS from DDoS attacks as well as the three new attack techniques. View now to learn a three phase strategy to mitigate these attacks.
Posted: 31 Mar 2015 | Published: 08 May 2013

Radware

4 Ways DNS Can Enhance Online Traffic & Security
sponsored by Neustar®
WHITE PAPER: In this white paper, discover 4 ways to optimize your DNS for better business and tighter security.
Posted: 02 Apr 2015 | Published: 11 Nov 2013

Neustar®

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

Top Identity Governance and Administration Vendors Examined
sponsored by SailPoint Technologies
WHITE PAPER: In this helpful guide, explore the strengths of the leading IGA platforms and vendors. Discover how to evaluate your needs and how each system fits into your IAM and IGA strategy. View now to learn more.
Posted: 24 Mar 2015 | Published: 12 Jan 2015

SailPoint Technologies

Advanced Threat Protection Lifecycle Defense
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a method of advanced threat protection that fights every step of the advanced threat lifecycle.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Blue Coat Systems

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

5 Steps to SSL Decryption
sponsored by Gigamon
WHITE PAPER: This white paper explores an alternative, five step SSL decrpytion strategy.  View now to learn more
Posted: 13 Apr 2015 | Published: 15 Oct 2014

Gigamon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement