IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet ThreatsReports
 
RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA, The Security Division of EMC

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This guide explores security automation and how you can ensure system security with 4 main strategies.
Posted: 10 Apr 2014 | Published: 31 Mar 2013

Qualys

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Authentication Management: Ensuring Security for Remote Workers
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Orange Business Services
sponsored by IBM
CASE STUDY: This informative guide explores Orange Business Services, a leader in communications technology, and outlines how their Secure My Device solution can help manage and secure mobile endpoints.
Posted: 07 Apr 2014 | Published: 31 Dec 2012

IBM

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
WHITE PAPER: This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Post-Breach Survival Guide
sponsored by INetU Inc.
WHITE PAPER: In this white paper, learn why an incident response plan is a must in today's vicious threat landscape. Click through to uncover 8 key elements to include in a proactive security posture.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement