IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation White Papers (View All Report Types)
The Key to Security, Growth & Innovation
sponsored by Raytheon|Websense
WHITE PAPER: This white paper introduces strategies that can help you implement effective data security without getting in the way of IT innovation.
Posted: 11 Sep 2015 | Published: 11 Sep 2015


Remove Network Traffic Blind Spots
sponsored by Radware
WHITE PAPER: In this white paper, learn how to shine a light on all network traffic shadows and dark spots to mitigate malicious programs and attacks. Continue reading to examine the 8 considerations for choosing an SSL visibility strategy.
Posted: 12 Nov 2015 | Published: 15 Apr 2015


The 10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This white paper presents 10 key points to consider as you develop your enterprise mobility strategy—from security to BYOD. Unlock the full potential of your mobility, and develop a comprehensive and security-conscious mobility strategy for your organization.
Posted: 28 Oct 2015 | Published: 31 Oct 2014


Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by WhiteHat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 01 Oct 2015 | Published: 18 Dec 2014

WhiteHat Security

Protection from Targeted Attacks
sponsored by Mimecast
WHITE PAPER: This white paper introduces a comprehensive form of threat protection that will keep out even today's advanced hacks.
Posted: 11 Sep 2015 | Published: 31 Dec 2014


Build an End-to-End Frame for Your Enterprise Mobility Security
sponsored by Good Technology
WHITE PAPER: In this report, you will learn how to deliver holistic mobile security architecture to your organization that will preserve end user privacy, and extend this protection to new devices and OS's.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Good Technology

Boost Protection Against Targeted Attacks with Sandboxing
sponsored by Trend Micro
WHITE PAPER: In this white paper, examine how sandboxing uncovers these hidden malware attacks by executing them in a secure and isolated environment.
Posted: 29 Sep 2015 | Published: 26 Aug 2015

Trend Micro

Security in a Dangerous Time: Network Security's Top Fears in 2015
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shares the top 5 security priorities that concerned network security professionals over the last year.
Posted: 17 Nov 2015 | Published: 08 Apr 2015

Fortinet, Inc.

It's Not You, It's Me: Understand the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Review the top 3 threats to public cloud environments in order to craft your security strategy to mitigate malware. Explore the shared security responsibility model to learn what steps you need to take to avoid falling victim to data breaches.
Posted: 26 Oct 2015 | Published: 11 Feb 2015

Alert Logic
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement