IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats Reports
 
Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

Why Traditional Data and Network Security is Not Good Enough
sponsored by Unisys
WHITE PAPER: Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell Software
WHITE PAPER: This paper discusses the multi-vendor nature common to most high-profile security breaches in retail enterprises. Learn about several of the characteristics common to recent breaches, and uncover a blueprint for a viable security model to prevent breaches in retail networks.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

A Comprehensive, Innovative Approach to Cloud Security
sponsored by Unisys
WHITE PAPER: The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.
Posted: 16 May 2016 | Published: 16 May 2016

Unisys

2016 Next-gen Infrastructure Security Report
sponsored by Illumio
ANALYST REPORT: The modern cybersecurity landscape is changing, how far are you willing to go to stay safe? This 2016 Next-gen Infrastructure Security Report will provide an overview of technology focusing on cloud and the challenges emerging with the software-defined anything (SDx) infrastructure.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Illumio

Security Considerations for Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how endpoint compliance should be enforced in the mobile era. Access now and you'll also explore considerations that are critical for ensuring a secure network.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Enhancing ATA Remediation: Monitor Continuously, Respond Swiftly
sponsored by Intel Security
PRODUCT OVERVIEW: Endpoint detection and response should be an indispensable supplement to your current defenses. Explore ways to evolve from a reactive mentality to a proactive one of continuous monitoring, and block advanced targeted attacks before it's too late.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security

Best Practices to Contain Cyberattacks
sponsored by Illumio
WHITE PAPER: As cyberattacks become more sophisticated, it is time to make a shift in your IT security strategy. One that involves redefining how to contain and handle the inevitable attack. Uncover the 7 best practices you must take to gain control over your enterprise security.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Illumio

There's Never Been A Better Time to Worry Less and Innovate More
sponsored by Cisco
WHITE PAPER: You need tools that fight digital vermin for you. Explore ways to leverage simple security, so your business can do what it does best: innovate and grow.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Cisco

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement