IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation White Papers (View All Report Types)
 
A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

Stop Data Breaches with Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Examine how privileged access management can help stop data breaches. Learn now about a 3-step process for blocking attackers' attempts to carry out crimes in your organization.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

Mobile Data Security: Finding the Balance for Secure Productivity
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Utilizing Security Ratings for Enterprise IT Risk Mitigation
sponsored by BitSight
WHITE PAPER: This white paper highlights a security ratings technology that measures company security performance and provides metrics to help mitigate risk and streamline security operations. Access now and learn how this cloud-based intelligence platform can help your enterprise improve your overall risk management in today's world of dangerous cyber-attacks.
Posted: 05 Feb 2016 | Published: 30 Jun 2014

BitSight

Cybersecurity for the Digital Age: The Essential Guide
sponsored by Dimension Data
WHITE PAPER: In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.
Posted: 19 Apr 2016 | Published: 12 Apr 2016

Dimension Data

Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

8 Reasons Streamlining Network Security Should be your Top Priority
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this brief resource to find testimonials from network analysts, IT directors, and security offers on strategies they used to efficiently gain greater visibility into network security.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

Cyber Security Intelligence Index for Retail
sponsored by IBM
WHITE PAPER: This security intelligence report examines the types of threats that retailers face and gives advice for staying safe. Access it now to learn how you can protect your retail organization from advanced attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

IBM

IoT Security: Have You Addressed These 10 Critical Issues?
sponsored by Axway
WHITE PAPER: Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

Axway

A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement