IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero ThreatsReports
 
How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Risk-Based Security Buyer's Guide: Addressing Enterprise-class Threats on an SME-class Budget
sponsored by TaaSera
WHITE PAPER: This exclusive whitepaper will show you how you must shift from a threat-based strategy that focuses on securing the perimeter to a risk-based approach that features a well-conceived incident response plan.
Posted: 08 Dec 2014 | Published: 10 Nov 2014

TaaSera

SIEM missteps? Tips to help you move forward: Presentation Transcript
sponsored by LogRhythm, Inc.
PRESENTATION TRANSCRIPT: Download this expert presentation transcript now to learn about key pitfalls you must avoid to find value in your security information and event management deployment at different maturity levels.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

LogRhythm, Inc.

Experts' Best Practices for Secure Remote Network Access
sponsored by ObserveIT
EGUIDE: This helpful guide compiles a number of expert tips on how to secure remote network access, including how to set up a secure home network; what to include in a remote access audit; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ObserveIT

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Central Bank and Trust
sponsored by ControlNow
WHITE PAPER: This exclusive case study takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive whitepaper now to learn about some ways you can reduce the costs, complexity, and administration resources of security for mid-sized businesses with a single solution for endpoint management.
Posted: 03 Dec 2014 | Published: 14 Oct 2014

IBM

How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


We’ve Been Breached!
sponsored by Delego
WHITE PAPER: This exclusive white paper will help you figure out what to do when a breach occurs to prevent as much damage as possible.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Delego
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement