IT Management  >   Systems Operations  >   Security  >  

Internet Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security Threats Reports
 
Building Natural Active Immunity against Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, companies can strengthen their defenses against advanced and unknown threats. Discover how you can build this natural active immunity with Fortinet.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Fortinet, Inc.

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

A Certified Concern
sponsored by SearchSecurity.com
EBOOK: Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
Posted: 21 Sep 2016 | Published: 20 Sep 2016

SearchSecurity.com

Mission-Critical Mobile Security: A Stronger, Sensible Approach
sponsored by Unisys
WHITE PAPER: This white paper shares a unqiue, innovative approach to help organizations address today's mobile security vulnerabilities and the security risks associated with BYOD. Uncover highlights for a reliable mobile security strategy that follows the user and is not limited to one device.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

Unisys

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

A New Security Approach for Governments: Micro-Segmentation
sponsored by Unisys
WHITE PAPER: Explore the power of a new security strategy, micro-segmentation. Learn now about the components of this strategy and how they address data protection challenges for today's governments.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Unisys

DR Tabletop Testing Simulator
sponsored by Databarracks
ASSESSMENT TOOL: Explore three disaster scenarios and answer the provided questions to reveal the appropriate recovery steps for each situation.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Databarracks

Mobile Malware Hits Active Sync-Only Devices
sponsored by MobileIron
WHITE PAPER: Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

How Glassdoor Blocks Unwanted Bad Bots
sponsored by Distil Networks
CASE STUDY: Learn how Glassdoor ensured their site metrics by proactively reducing bad bot traffic. Discover how they implemented a proactive (and not after-the-fact) strategy, ensured 99.9% of advertising platform traffic comes from real humans, and avoided driven up infrastructure costs.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Distil Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement