IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network ThreatsReports
 
Multifactor Authentication Methods You Can Use Now
sponsored by HID
EGUIDE: While FIDO-ready technology is still developing, there are several multifactor authentication methods that are ready to use now.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

HID

Demystifying Security Controls for IT Risk & Audit Professionals
sponsored by Bit9, Inc.
WEBCAST: Although you may be a compliant company, if you disregard security threats and the technologies and tools to protect them, then you are as vulnerable as anyone. Watch this webcast to learn about the risks that face your organization if you don't meet compliance guidelines and how to meet these goals.
Posted: 18 Aug 2014 | Premiered: Aug 18, 2014

Bit9, Inc.

The Top 8 Mobile Security Risks: Is Your Organzation Protected?
sponsored by BlackBerry
WHITE PAPER: In this essential white paper, discover the top 8 security risks for mobile devices and determine if your organization's assets are properly protected.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Security Solutions: Balancing Protection and Productivity
sponsored by BlackBerry
WHITE PAPER: In this in-depth white paper, explores security solutions that provide transparent security, integrated containerization for simply application development and deployment, and a more optimal user experience.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

BlackBerry

ID Solution for Enterprise Trusted Anytime, Anywhere Access to and from Mobile Devices
sponsored by HID
WHITE PAPER: This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token.
Posted: 18 Aug 2014 | Published: 20 Feb 2013

HID

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

IBM

Security Threat Report 2014
sponsored by Sophos, Inc.
WHITE PAPER: In this security threat report, explore how malware has evolved and botnet and exploit kit innovations have proliferated. Read on to learn how a hacker can profit from your smartphone, tips for protecting your web server and clients, how to protect from targeted threats to your financial accounts, and more.
Posted: 11 Aug 2014 | Published: 31 Dec 2013

Sophos, Inc.

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement