IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web Threats White Papers (View All Report Types)
 
Mobile Threat Management
sponsored by IBM
WHITE PAPER: Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM

Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Best Practices to Contain Cyberattacks
sponsored by Illumio
WHITE PAPER: As cyberattacks become more sophisticated, it is time to make a shift in your IT security strategy. One that involves redefining how to contain and handle the inevitable attack. Uncover the 7 best practices you must take to gain control over your enterprise security.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Illumio

Event Logs and Security: Cutting Through the Noise
sponsored by Intersect Alliance
WHITE PAPER: Learn how event logs, normally choked with superfluous white noise, can be used to zero in on suspicious behavior before it causes a breach.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Intersect Alliance

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Pervasive Security Enabled by Next Generation Monitoring Fabric
sponsored by Big Switch Networks
WHITE PAPER: As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.
Posted: 05 Apr 2016 | Published: 29 Dec 2015

Big Switch Networks

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Help Your Security Team Sleep at Night
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Every day there are new reports of application exploits, organized campaigns to impact network operations, and internal malicious behavior. Get a glimpse into an effective security architecture, and find out how built-in reporting and monitoring workflows can be directly leveraged to enhance your business' security strategy.
Posted: 23 May 2016 | Published: 23 May 2016

Riverbed Technology, Inc.

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement