IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero ThreatsReports
 
Protection for Every Enterprise: Maximizing Mobile Security
sponsored by BlackBerry
WHITE PAPER: In this helpful white paper, get the facts on mobile security and the best protections strategies from today's advanced cyber threats.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

Diversionary and Multivector DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this essential white paper, you'll learn about the rise of these destructive attacks, why they are so difficult to block, and how an integrated security solution could help keep your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

The Essential Elements of Critical Infrastructure Protection against Advanced Threats
sponsored by FireEye
WHITE PAPER: This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

FireEye

How MSPs Can Help SMBs Prevent Irreparable Data Loss
sponsored by N-able Technologies
WHITE PAPER: This resource answers a number of questions that MSPs may have regarding helping their customers to protect their critical data from loss, and also provides a list of items to look for when choosing a managed backup solution.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

N-able Technologies

Advanced Evasion Techniques For Dummies
sponsored by McAfee, Inc.
EBOOK: In this in-depth eBook, you'll learn about the different kinds of cybercrime organizations are up against today, and the best strategies to protect yourself from these advanced evasions and attacks.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

McAfee, Inc.

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

ID Solution for Enterprise Trusted Anytime, Anywhere Access to and from Mobile Devices
sponsored by HID
WHITE PAPER: This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token.
Posted: 18 Aug 2014 | Published: 20 Feb 2013

HID

Why Security is Paramount in Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: Inside this informative white paper, explore a new Enterprise Mobility Management (EMM) solution which makes it easy to create, manage, and secure apps on any device.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement