IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network ThreatsReports
 
What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

5 Things Your Organization Can Do Today to Improve Security
sponsored by CDW Corporation
WHITE PAPER: This informative resource contains insights from a security assessment professional on the problematic patterns that he has observed within a wide variety of organizations, as well as their simple but critical solutions.
Posted: 22 Jul 2014 | Published: 04 Apr 2014

CDW Corporation

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft – without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Posted: 21 Jul 2014 | Published: 15 Nov 2012

Dell, Inc. and Intel®

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 08 Jul 2014 | Published: 16 Dec 2013

Sophos, Inc.

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
WHITE PAPER: This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Webroot

BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure
sponsored by Sophos, Inc.
WHITE PAPER: This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos, Inc.

Applying Innovation and Expertise to Enterprise Security
sponsored by CDW Corporation
WHITE PAPER: This helpful white paper introduces one renowned company's security solutions, which cover risk and compliance from end to end.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

HID Global’s Identity Assurance SMB Solution
sponsored by HID
WHITE PAPER: In this resource, explore how a strong authentication method is possible without tokens or any complexity.
Posted: 10 Jul 2014 | Published: 03 May 2013

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement