IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web ThreatsWhite Papers (View All Report Types)
 
Protect Your Company's Lifeblood
sponsored by Onapsis
WHITE PAPER: The following white paper examines the potential hazards of overlooking ERP application layer security and offers insight into a platform solution intended to help improve visibility and descrease security vulnerabilities.
Posted: 28 Oct 2014 | Published: 28 Oct 2014


10 Steps to Mitigate a DDoS Attack in Real Time
sponsored by F5 Networks
WHITE PAPER: This brief resource details a 10-step process to stopping distributed denial of service (DDoS) attacks immediately and before critical damage can be made.
Posted: 22 Oct 2014 | Published: 15 Jan 2014

F5 Networks

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

An Approach to Security Frameworks
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will show you how to meet compliance frameworks while also improving security levels.
Posted: 29 Oct 2014 | Published: 23 Sep 2014

Symantec Corporation

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

Beyond the Firewall: Protection and Performance
sponsored by Akamai Technologies
WHITE PAPER: Access this exclusive paper that explains how to achieve greater visibility into the global threat landscape and create a more proactive resilient defense against cyberattackers. Additionally, find out how to address the challenge of a changing defense budget in the next few years.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

Cloud Security Solutions You Can Trust
sponsored by Intel Corporation
WHITE PAPER: This white paper explains how cloud security solutions from Intel and VMware can enable your organization to confidently deploy a cloud infrastructure by safeguarding your sensitive data and strengthening regulatory compliance.
Posted: 20 Nov 2014 | Published: 30 Apr 2013

Intel Corporation

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement