IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk Reports
 
Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016

IBM

Data at Rest: Pragmatic Approach to Data Security
sponsored by STEALTHbits
RESOURCE: There are also risks associated to having all that data spread throughout the IT ecosystem. Discover the risks associated with unstructured data and how to best approach these risks. Understand why getting a handle on your data at rest can get you the security results you desire.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Fight Unwanted Intrusions with Multi-Layered Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to make your security systems work together as one. Learn how to achieve better communication between existing security tools and stop known threats, unknown threats, APTs and prevent future breaches.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Fortinet, Inc.

APRIL 2016 SECURITY OPERATIONS CENTER REPORT
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar

DIGIPASS GO 7
sponsored by VASCO Data Security International
WHITE PAPER: Discover a convenient single-button authentication device that boosts security while providing unmatched user acceptance. Access now to learn how to economically deploy a comprehensive, scalable, high performance two-factor authentication solution for secure network/remote access.
Posted: 30 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Deriving Value from the Technical Security Test
sponsored by SecureWorks
WHITE PAPER: Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

For Better Access Governance, Look Beyond Roles to
sponsored by IBM
WHITE PAPER: Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

The Insider Threats: Be Protected with Advanced DNS Security
sponsored by EfficientIP
WHITE PAPER: See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement