IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation White Papers (View All Report Types)
 
Using Managed Endpoint Security to Grow Your Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper outlines how MSPs can prevent client chaos by implementing managed endpoint security into their services.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Solarwinds N-able

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015

Lookout

Mobilize Your Email with Enterprise-Grade Security and Data Protection
sponsored by Citrix
WHITE PAPER: This white paper explains how to mobilize your email with enterprise-grade security that can increase productivity, while giving IT the flexibility to meet the unique requirements of different use cases and data types.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Citrix

Mobilize Your Virtual Enterprise Applications with 4 Steps
sponsored by StarMobile
WHITE PAPER: Learn how next-generation remote computing protocols accelerate your company's application mobilization and improve user experience. Continue reading to access advice on implementing successful enterprise mobilization.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

StarMobile

Safeguarding Data and the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

IBM

Five Signs You Have Been – Or Are Being – Hacked
sponsored by EE
WHITE PAPER: This white paper can help you stay alert for advanced threats with five signs that your organization has been hacked
Posted: 12 Aug 2015 | Published: 12 Aug 2015

EE

Think You are Safe from DDoS Attacks?
sponsored by Neustar®
WHITE PAPER: This white paper examines the repercussions of relying solely on firewalls and IPS/IDS to attempt blocking DDoS attacks. View now to learn the steps to take to protect sensitive data stored in the cloud.
Posted: 02 Jun 2015 | Published: 06 May 2015

Neustar®

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Lookout

Inside a Spear-Phishing Attack and How To Prevent Them
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Defend Your Backend Mobile Web Properties
sponsored by Citrix
WHITE PAPER: This white paper explains how to extend coverage to your organization's mobile devices on the front end of mobile micro apps, while protecting the backend components of your web solutions. Read on to examine how BYOD can improve your enterprise.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement