Vertical Industries  >   Financial Services Industry  >  

Financial Securities Industry

RSS Feed    Add to Google    Add to My Yahoo!
Financial Securities Industry Reports
 
Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 03 Nov 2014 | Published: 18 Sep 2014

Cisco Systems, Inc.

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Central Bank and Trust
sponsored by ControlNow
WHITE PAPER: This exclusive case study takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

How Do Top SIEM Products Compare in Common Client Deployment Scenarios?
sponsored by IBM
WHITE PAPER: This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.
Posted: 27 Aug 2014 | Published: 25 Jun 2014

IBM

Anatomy of an Attack
sponsored by Promisec
WHITE PAPER: This document breaks down the malware attack that was launched on Target. It also illustrates how Promisec can deliver true visibility and control in a constantly evolving threat environment.
Posted: 19 May 2014 | Published: 19 May 2014

Promisec

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement