IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation White Papers (View All Report Types)
 
How Banks Secure Conversations with their Most Valued Customers
sponsored by NICE Systems, Inc
WHITE PAPER: Voice biometrics technologies are proving to be the ideal candidate for intelligent authentication in the context of client-to-advisor conversations. Discover ways to leverage a person's voice as an accurate identifier without interrupting the natural flow of conversation.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

NICE Systems, Inc

Extend Your Access Management Regime To Office 365
sponsored by IBM
WHITE PAPER: See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise's data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

IBM

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

A Unified View for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Online Archiving Now Easier Than Ever
sponsored by LogicNow
WHITE PAPER: Discover how using email archival is vital to enterprises. Learn how it not only covers your bases when catastrophe looms, but also provides robust security to your messages.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

LogicNow

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360

Unisys' Tom Patterson: 3 Key Steps in Securing Critical Infrastructure
sponsored by Unisys
WHITE PAPER: In this video, Tom Patterson, VP and GM of Unysis Global Security Solutions, discusses the need to protect critical infrastructure systems. Uncover three key tips to get started.
Posted: 26 Aug 2016 | Published: 08 Jan 2016

Unisys

Think Again if you believe your email archiving problems are solved with Office 365
sponsored by LogicNow
WHITE PAPER: Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Security Teams Must Empower Employees to Prevent Phishing Attacks
sponsored by Mimecast
WHITE PAPER: This informational report from Forrester addresses where security awareness is falling short and how you can revamp your security awareness programs to empower employees to protect themselves and your organization from phishing attacks. Learn how to help users protect themselves and your enterprise from these cybercrimes.
Posted: 02 Jun 2016 | Published: 20 Aug 2015

Mimecast

The Importance Of Network Data When It Comes To Protecting Your IT System
sponsored by IBM
WHITE PAPER: With the growing amount of threats in today's IT landscape, businesses have bolstered their network security with greater visibility methods. This guide explores the importance of network data when it comes to protecting your network with SIEM.
Posted: 15 Jun 2016 | Published: 31 Jan 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement