IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation White Papers (View All Report Types)
 
5 Steps to Empowering Employees for Secure Cloud Service Usage
sponsored by IBM
WHITE PAPER: This brief infographic highlights five necessary steps to secure cloud service usage. Find out how you can discover, identify, and track cloud application usage and ultimately empower employees to safely use cloud services.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

IBM

Advanced Session Security
sponsored by CA Technologies
WHITE PAPER: Surveys show that IT security experts have identified session hijacking as one of the top three security risks. Access this white paper and uncover details on two highly successful methods for enhancing session security.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

CA Technologies

Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

Protect Against Email-Borne Threats
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how advanced threat protection can uncover and prioritize sophisticated attacks entering your organization through email. Discover how you can leverage targeted attack identification, detailed malware reporting, data correlation, a consolidated view of attacks across endpoints, networks, and email, and more.
Posted: 02 Dec 2015 | Published: 31 Oct 2015

Symantec Corporation

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

Defending Your Office 365 Data: Five Threats That Microsoft Can't Defend Against, But You Can
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses where Office3 365's built-in security capabilities fall short and how you can shore up your defenses. Gain the knowledge you need to stay secure while taking advantage of all Office 365 has to offer.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Datto, Inc.

Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement