IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
Threats White Papers (View All Report Types)
 
Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM

The Mobile Cloud: How Cloud Services Cast Dark Shadows on Mobile Activity
sponsored by IBM
WHITE PAPER: This article explains how cloud app security brokers solutions (CASBs) are giving CISOs visibility into employee usage of cloud apps in the enterprise. Read on to learn the benefits of integrating this technology with enterprise mobility management (EMM) tools.
Posted: 01 Dec 2015 | Published: 04 Nov 2015

IBM

Modernize and Secure your Business
sponsored by Microsoft
WHITE PAPER: In this solution brief, you'll learn how modern businesses are meeting the expectations of workers to be able to work anywhere, anytime on virtually any device. Discover ways to manage devices and provide workers with secure access to the corporate data and apps they need.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

Microsoft

Report: 2015 Cybersecurity Intelligence Index
sponsored by IBM
WHITE PAPER: In this report, you'll uncover the major threats to businesses worldwide over recent years, and how companies can better detect and insulate themselves from future attacks in the face of new technology.
Posted: 30 Nov 2015 | Published: 31 Jul 2015

IBM

Analytics Stop Advanced Threats in their Tracks
sponsored by Blue Coat Systems
WHITE PAPER: In this solution brief, you'll find relief knowing that breaches can be treated with a comprehensive approach that provides the intelligence and real-time analysis needed to see, understand, respond to and fortify the network against advanced threats.
Posted: 04 Dec 2015 | Published: 31 Dec 2014

Blue Coat Systems

Is Your Network Safe? Identifying Most Overlooked Endpoint of Them All
sponsored by HP Limited
WHITE PAPER: In this white paper, you will highlight the most critical vulnerabilities that network-connected printers pose. Read on now to enforce user authentication, admin passwords, and printer feature restriction for your network-connected endpoints.
Posted: 12 Jan 2016 | Published: 31 Jan 2015

HP Limited

Managing the Secure Deployment of Cloud Services
sponsored by IBM
WHITE PAPER: This white paper invites you to explore the possibilities of a SaaS-based approach to the secure deployment and use of cloud services. Access now and learn how to make it easier for business users to access sanctioned cloud services and introduce elements of identity and access management (IAM) that are often missing.
Posted: 22 Dec 2015 | Published: 27 Oct 2015

IBM

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

Advanced Session Security
sponsored by CA Technologies
WHITE PAPER: Surveys show that IT security experts have identified session hijacking as one of the top three security risks. Access this white paper and uncover details on two highly successful methods for enhancing session security.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

CA Technologies

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: Learn how to uncover the what, when, and how of security incidents to fortify your security strategy against increasingly sophisticated attacks. Examine the shortcomings of conventional breach investigation approaches and how to build intelligence to navigate investigations faster and easier in this helpful whitepaper.
Posted: 12 Nov 2015 | Published: 14 Apr 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement