IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web Threats White Papers (View All Report Types)
Bullet-proofing Office 365 Security
sponsored by ControlEmail
WHITE PAPER: In this white paper, you'll learn how to augment cloud-based email security to defend against the top threats such as phishing and malware infection.
Posted: 26 Aug 2015 | Published: 29 Jul 2015


The Cost of a Data Breach in 2015
sponsored by IBM
WHITE PAPER: This Ponemon report uses data from all over the UK to calculate how different organizational factors impact the cost of a data breach.
Posted: 03 Sep 2015 | Published: 31 May 2015


Network-Wide Targeted Attack Detection
sponsored by Trend Micro
WHITE PAPER: This white paper explores holistic network security and how to detect and respond to targed attacks no matter where malware may be hiding
Posted: 01 Oct 2015 | Published: 26 Aug 2015

Trend Micro

Continuous Compliance: Moving Beyond a Checklist Mentality
sponsored by Unisys
WHITE PAPER: Access this white paper to learn the 5 steps to continuously monitor activities to ensure ESF or RSF frameworks compliance.
Posted: 25 Sep 2015 | Published: 14 May 2015


IT's Confidence in Threat Defenses May Be Misplaced
sponsored by McAfee, Inc.
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

McAfee, Inc.

Using Managed Endpoint Security to Grow Your Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper outlines how MSPs can prevent client chaos by implementing managed endpoint security into their services.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Solarwinds N-able

Mobile Data Security: Finding the Balance
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 13 Aug 2015 | Published: 07 Aug 2014


Security Questions CEOs Should be Asking
sponsored by MASERGY
WHITE PAPER: This infographic highlights three of the most basic questions that CEOs should ask about their security.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 06 Oct 2015 | Published: 17 Jun 2015


Battling Security Threats from within Your Organization
sponsored by IBM
WHITE PAPER: This white paper explores the risk of insider attacks, both malicious and accidental, and gives tips on how you can secure yourself against them.
Posted: 11 Sep 2015 | Published: 30 Jun 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement