Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing Software (Security) Reports
 
Respond to Threats Faster and More Effectively Than Ever
sponsored by ServiceNow
WEBCAST: Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.
Posted: 30 Jan 2017 | Premiered: Jan 30, 2017

ServiceNow

The Mimecast Email Security Risk Assessment 2017
sponsored by Mimecast
WHITE PAPER: By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

How to Speed Up Your Breach Detection Rate
sponsored by Cisco
WHITE PAPER: Learn how to reduce time to breach detection and increase detection rate. Discover how to reduce the space and time attackers have to harm your organization.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Nine Types of Cyber Threats and How to Stop Them
sponsored by Solarwinds MSP
WHITE PAPER: Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

Solarwinds MSP

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
TRANSCRIPT: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 16 Feb 2017 | Published: 09 Feb 2017

AttackIQ

Email Security Threats: Not Just from the Outside
sponsored by Mimecast
WHITE PAPER: Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

How to Get More Signal, Less Noise for Your SIEM
sponsored by ExtraHop
WHITE PAPER: Uncover how adding wire data to your SIEM platforms can reduce the time spent by security teams in collecting and normalizing log data, minimize storage costs, and increase the effectiveness of your SIEM platform by providing better contextual information about threats and incidents.
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ExtraHop

Quantifying the Risk and Economic Impact of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Distil Networks

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement