IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web Threats White Papers (View All Report Types)
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work
sponsored by Sierraware
WHITE PAPER: As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.
Posted: 05 Apr 2016 | Published: 30 Mar 2016

Sierraware

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
WHITE PAPER: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Laptop Management for Windows
sponsored by IBM
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM

Securosis: SIEM Kung Fu
sponsored by Intel Security
WHITE PAPER: Learn how to make the most of your existing security information and event management (SIEM) product or service as we reveal real-world use cases as to why SIEM still matters (although no longer requires a ninja DBA to help with it) and how your current security monitoring platform can be leveraged to enable faster detection and prevention.
Posted: 06 May 2016 | Published: 21 Apr 2016

Intel Security

Mobile Security Checklist: Plan for Security and Compliance
sponsored by Sierraware
WHITE PAPER: BYOD is becoming the norm in today's business landscape and it is a major security threat. Access this white paper to learn about internet exploits, insider abuse, regulatory compliance and a checklist of steps you can take to ensure secure mobile networking.
Posted: 13 Apr 2016 | Published: 01 Apr 2016

Sierraware

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn the results of an independent test of the Check Point 13500 Next Generation Threat Prevention Appliance with Threat Emulation Cloud Service R77.20.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Top 5 Benefits of a Security Operations Center
sponsored by IBM
WHITE PAPER: This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.
Posted: 14 Mar 2016 | Published: 31 Dec 2013

IBM

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement