IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Inside a Spear-Phishing Attack and How To Prevent Them
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Secure Content For the Mobile Enterprise
sponsored by Acronis
WHITE PAPER: Download and discover how Acronis Access Advanced enables simple, secure and managed mobile file access, sync and share.
Posted: 02 Jul 2015 | Published: 31 Jul 2014

Acronis

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

What to Look for in Enterprise Mobility Management
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features -- for mobile device management, mobile app management, mobile content management and more -- so they vary greatly. This guide reviews capabilities and features you'll want to consider before you buy.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

How to Choose A Certificate Authority For Safer Web Security
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Posted: 17 Jul 2015 | Published: 11 Nov 2013

GeoTrust, Inc.

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the challenges of defending modern web app properties from modern threats, and discover how you can benefit from deploying an application delivery controller (ADC).
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

The Innovation Index: Is Your Organization Equipped for Growth?
sponsored by Verizon
RESEARCH CONTENT: This quick survey identifies seven areas to review as potential strengths or weaknesses in your network.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Verizon

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

Cybersecurity: The New Agenda
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: In this white paper, recognized security expert Jim Anderson discusses how organizations need to change in order to protect themselves in the new threat landscape.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement