IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
Threats White Papers (View All Report Types)
 
App-ID Tech Brief: Traffic classification that identifies applications traversing your network
sponsored by Palo Alto Networks
WHITE PAPER: In this technology brief, learn about App-ID, a patented traffic classification technology that identifies applications traversing your network. Find out how App-ID enables creation and enforcement of safe application enablement policies and brings increased application visibility and control back to the firewall.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

Palo Alto Networks

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

How to Create, Deploy, and Operate Secure IoT Applications
sponsored by Telit
WHITE PAPER: According to Gartner, spending on IoT security is expected to reach $547 million in 2018. In this white paper, gain valuable insights on how to create, deploy and operate end-to-end security to help identify and prevent hackers from getting your organizations data through IoT devices.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Telit

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.
Posted: 12 Jan 2018 | Published: 28 Dec 2017

Veracode, Inc.

7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper offers 7 key questions to ask when selecting an incident response service provider, to help you evaluate vendors based on your organization's needs.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

Dell SecureWorks

VoIP Adoption Leads to Free PCI Upgrades for Major Quick Service Restaurant
sponsored by Hughes Network Systems
WHITE PAPER: The case study uncovers how VoIP adoption and network service consolidation helped a popular restaurant chain address growing cybersecurity challenges and increase their bandwidth for the best network connection.
Posted: 01 Sep 2017 | Published: 30 Apr 2017

Hughes Network Systems

Securing Operational Technology in the Pharmaceutical and Chemical Manufacturing Industries
sponsored by Bayshore Networks
WHITE PAPER: In this white paper, gain a stronger understanding of the cyber security implications of IoT devices in pharmaceutical and chemical manufacturing. Uncover 4 key considerations for protecting against cyber threats when leveraging the IIoT.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Bayshore Networks

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

Analyzing the Malware Threat
sponsored by Symantec
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement