Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing Software (Security) Reports
 
4 Steps to Securing Your Data: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: This valuable resource discusses 4 steps you can take to find and address your database vulnerabilities and avoid a data breach.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

Mitigating the cyber threat from malicious insiders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Forrester: Use Actionable Threat Intelligence to Protect Your Digital Business
sponsored by Symantec Corporation
WHITE PAPER: Download this report from Forrester to figure out the key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.
Posted: 14 Aug 2015 | Published: 14 Aug 2014

Symantec Corporation

The Secret To Finding Unknown IT Security Threats
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how predictive analytics and adaptable machine learning can enhance your security and protect you from even the worst threats.
Posted: 24 Mar 2015 | Published: 18 Mar 2014

Prelert

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: You know that the loss of a single device or power source could jeopardize network connectivity and your business. In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Sagicor Takes on Malware and Wins
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper tells the story of how one financial institution put a stop to their constant stream of malware attacks.
Posted: 08 May 2015 | Published: 08 May 2015


Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: This white paper examines the security threats organizations face when attackers continue to abuse enterprise provisioning and use it to sideload malware on iOS devices.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement