IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero Threats Reports
 
Wireless Network Security - Next Gen Firewalls
sponsored by Dell Software
WHITE PAPER: In this white paper, examine the infrastructure of one next-gen wireless firewall.
Posted: 01 Jun 2015 | Published: 18 Dec 2014

Dell Software

Securely Leveraging Internet of Things Data
sponsored by Aruba Networks
WHITE PAPER: This white paper explores how to build a trust-based IoT web for business-critical applications using a new methodology. Continue reading to learn how to exploit IoT data without incurring unacceptable levels of risk.
Posted: 08 Jun 2015 | Published: 06 May 2015

Aruba Networks

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Today's Top 8 Cybersecurity Threats
sponsored by Dell Software
WHITE PAPER: This informative white paper presents and details the top cybersecurity threats and attacks to help your organization re-evaluate your security strategy.
Posted: 28 May 2015 | Published: 01 Apr 2015

Dell Software

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett-Packard Company
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 15 May 2015 | Published: 16 Apr 2015

Hewlett-Packard Company

Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013

HID

2015 Mobile Threat Report
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to discover in-depth research about the current state of mobile security and learn what you need to do to keep your enterprise protected.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Pulse Secure

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell, Inc.
WHITE PAPER: Explore the multi-vector nature common to most high-profile retail security breaches in this white paper and learn about the several common characteristics of recent breaches and how to protect your data against hackers.
Posted: 12 May 2015 | Published: 06 May 2015

Dell, Inc.

Case Study: Deploying Secure Public WiFi
sponsored by Dell Software
CASE STUDY: This brief case study examines how one Australian city council enabled secure WiFi in all public buildings using a next-gen firewall to protect endpoints, users, and sensitive data. Access now to learn how to mitigate mobile and network threats.
Posted: 27 May 2015 | Published: 13 May 2015

Dell Software

The Human Firewall – Strengthening Email Security
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement