IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Threats Reports
Supporting Technologies and Enterprise Scenarios for Deploying DLP Products
sponsored by Oracle Corporation
EGUIDE: In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Best Practices for Maintaining a Secure Enterprise
sponsored by MASERGY
EGUIDE: Access this guide for essential information on security threats, compliance concerns, and the best practices you need to adopt to overcome them.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


CISOs: Dos and Don'ts for Incident Response Management
sponsored by IBM
EGUIDE: This two-part guide includes an in-depth interview with corporate attorney and cybersecurity insider Chris Pierson on incident response planning and the role that a CISO should play. Next, IT service providers will uncover vital information on protecting SMB customers from sophisticated cyberattacks.
Posted: 03 Nov 2015 | Published: 02 Nov 2015


Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS).
Posted: 05 Nov 2015 | Published: 31 Dec 2013

Proofpoint, Inc.

Leverage the Global Threat Community to Prevent Unknown Threats with the Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will discover how to reduce your attack surface and block all known and unknown threats with a threat intelligence cloud platform. Access this advice now to detect unknown threats and convert them into known, stoppable threats.
Posted: 15 Oct 2015 | Published: 15 Oct 2015

Palo Alto Networks

Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 12 Nov 2015 | Published: 01 Jun 2015

Hewlett Packard Enterprise

Safeguard Your Financial Information with a Complete Governance Framework
sponsored by IntraLinks, Inc
WHITE PAPER: This brief white paper explains how to reduce the risk associated with exchanging financial information between the corporation and outside auditors. Learn how to secure your finance team and maximize your productivity with insight into key transactions.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

IntraLinks, Inc

5 Network Security Lessons We Should All Learn from the Sony Hack
sponsored by Trend Micro
EGUIDE: Access this expert guide now to uncover the 5 enterprise network security lessons that could have helped Sony Pictures Entertainment to avoid its data breach fate, from treating APTs seriously to getting the right executives on board.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Trend Micro

Vendor Comparison: Choose the Right DDoS Service Provider
sponsored by Akamai
WHITE PAPER: This Forrester report examines nine of the most significant offerings in the DDoS protection market, giving you insight into the strengths and weaknesses of each one.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


Momentive Implements Smarter Data Loss Prevention with Titus and McAfee
sponsored by TITUS
CASE STUDY: This short case study reviews the benefits that Momentive achieved using new data loss prevention technology augmented by classification levels, ensuring both security and manageability.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement