IT Management  >   Systems Operations  >   Security  >  

Audits

RSS Feed    Add to Google    Add to My Yahoo!
Audits Reports
 
Unmasking Subdomain Abuse: How to Protect Against These Stealth Attacks
sponsored by Farsight Security
TRANSCRIPT: Discover how cyber-criminals are increasingly using both legitimate as well as malicious subdomains to gain entry into networks and commit other cyber-crime.
Posted: 08 May 2017 | Published: 03 Feb 2017

Farsight Security

Maximizing Mobile Security and Productivity
sponsored by BlackBerry
WHITE PAPER: Learn how to make your organization more mobile-secure in 5 steps.
Posted: 01 May 2017 | Published: 01 May 2017

BlackBerry

Office 365: Is the ROI worth it?
sponsored by Microsoft
WHITE PAPER: In this Forrester report discover the ROI of Office 365, and better understand the benefits, costs, and risks associated with an Office 365 implementation within a mid-sized company.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: In this ESG lab report discover how to deploy fast and easy identification and prioritization of email-based cybersecurity threats, giving your organization at-a-glance summary information about each threat.
Posted: 01 May 2017 | Published: 31 Jan 2017

Proofpoint, Inc.

Security Use Case Detecting Unknown Malware
sponsored by Splunk
WHITE PAPER: Learn how to gain significant power over understanding detailed activities on endpoint as well as the ability to detect advanced and unknown malware activities.
Posted: 03 May 2017 | Published: 03 May 2017

Splunk

5 Questions Executives Should Be Asking Their Security Teams
sponsored by Microsoft
WHITE PAPER: This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Leveraging a Security-First Approach to Compliance
sponsored by evident.io
WHITE PAPER: Learn how to meet the challenges of public cloud environments with a modern approach of a security-first model which enables continuous visibility through automation and more.
Posted: 23 May 2017 | Published: 23 May 2017

evident.io
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement