Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
126 - 150 of 1818 Matches Previous Page  |  Next Page
2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

Worried About Mobile Security? You Should be
sponsored by IBM
WHITE PAPER: Learn the importance, growth, and lethal significance of mobile security threats. Uncover why malware has exploded out of its infancy with a vengeance, how built-in security controls from vendors won't protect mobile devices, why fraudsters can effectively "fly under the radar", and more.
Posted: 01 Sep 2016 | Published: 31 Jul 2016

IBM

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 01 Sep 2016 | Published: 02 Sep 2016

ComputerWeekly.com

Secure your Mobile Enterprise
sponsored by Unisys
WHITE PAPER: How can organizations better secure their mobile environment to confidently secure access from employee-owned or third party mobile devices? Access this white paper and discover a new, innovative security approach that can secure the entire data path and conceal endpoints.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Unisys

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Fortunately, it's possible for organizations with limited budgets and higher risk tolerances to achieve significant improvements in security maturity. Discover ways to adopt mature capabilities by building an integrated architecture.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

Anatomy of a Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

Assessment: 14 Security Information and Event Management Vendors
sponsored by LogRhythm, Inc.
WHITE PAPER: The need for early targeted attack detection and response is driving the expansion of new and existing SIEM deployments. Uncover this report to find out how 14 vendors of SIEM technology fared in an analysts' assessment.
Posted: 30 Aug 2016 | Published: 10 Aug 2016

LogRhythm, Inc.

Applied Behavior Analytics: Don't Be an Outlier!
sponsored by Distil Networks
WHITE PAPER: In this 451 Research report excerpt, explore the implications of applied behavior analytics (ABA) on today's security landscape. Learn about the ABA market, the different types of behavior analytics, insider monitoring systems and more. Plus, get recommendations on how you can proceed with ABA.
Posted: 30 Aug 2016 | Published: 30 Jun 2016

Distil Networks

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Mission-Critical Mobile Security: A Stronger, Sensible Approach
sponsored by Unisys
WHITE PAPER: This white paper shares a unqiue, innovative approach to help organizations address today's mobile security vulnerabilities and the security risks associated with BYOD. Uncover highlights for a reliable mobile security strategy that follows the user and is not limited to one device.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

Unisys

Information Security Consulting Services Report
sponsored by IBM
WHITE PAPER: This Forrester report evaluates the 13 most significant information security consulting service providers against a set of 31 criteria. Uncover how well these consultancies fulfill the criteria and where they stand in relation to each other.
Posted: 30 Aug 2016 | Published: 29 Jan 2016

IBM

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

Cybersecurity Perspectives from the Boardroom and C-suite
sponsored by IBM
WHITE PAPER: Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.
Posted: 30 Aug 2016 | Published: 01 Jul 2016

IBM

The Case for Security Intelligence Services, Hosted from the Cloud
sponsored by IBM
WHITE PAPER: Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.
Posted: 30 Aug 2016 | Published: 01 Apr 2015

IBM

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Blue Coat Systems
WHITE PAPER: This step-by-step guide takes you through the 11 things that an enterprise needs to do in order to de-risk apps and employees and maximize their use of adopting cloud applications and services. Learn not only the benefits, but the pitfalls and dangers, of using cloud services like Box, Dropbox, Office 365, and Salesforce.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Blue Coat Systems

Your Guide for Identity Governance and Administration
sponsored by IBM
ANALYST REPORT: This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.
Posted: 29 Aug 2016 | Published: 29 Feb 2016

IBM

Magic Quadrant for Security Information and Event Management
sponsored by IBM
RESEARCH CONTENT: The need for early targeted attack detection and response is driving the expansion of new and existing security information and event management deployments. This report by Gartner examines and compares the top vendors who market and sell SIEM products. Find out the strengths and weaknesses of each vendor so that you can better navigate the market.
Posted: 29 Aug 2016 | Published: 10 Aug 2016

IBM

For Better Access Governance, Look Beyond Roles to
sponsored by IBM
WHITE PAPER: Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.
Posted: 29 Aug 2016 | Published: 31 Jul 2016

Distil Networks

The Evolution and Impact of Hidden Mobile Threats
sponsored by Wandera
WHITE PAPER: Learn to protect your mobile workforce and their devices comprehensively in this white paper. Uncover the many attack vectors malicious users and programs use to target vital enterprise and personal data, and how to plug any gaps you many have in your defenses.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Wandera

Tolly Test Report: Evaluating a Web Protection Vendor
sponsored by IBM
WHITE PAPER: In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

Ransomware Multi-layered Approach
sponsored by TrendMicro
WHITE PAPER: Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

How Trend Micro Stacks Up among Endpoint Protection Vendors
sponsored by TrendMicro
WHITE PAPER: This Gartner Magic Quadrant report offers cyber security executives invaluable information you can use to choose your next endpoint protection vendor.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro
126 - 150 of 1818 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement