IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management Reports
 
Stopping Crypto Ransomware
sponsored by Datto, Inc.
WHITE PAPER: Discover a 16-point guide to combating crypto ransomware in today's threat landscape.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.

Ensure your DDoS Solution Works in Real-World Conditions
sponsored by A10 Networks
WHITE PAPER: Learn about the various types of DDoS attacks, challenges that are involved with detecting and mitigating these attacks, importance of validating any threat protection solution for real-world performance, and more.
Posted: 25 May 2017 | Published: 25 May 2017

A10 Networks

What Makes a Cyber Resilient Organization?
sponsored by IBM Resilient
WHITE PAPER: With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.
Posted: 19 Jun 2017 | Published: 28 Feb 2017

IBM Resilient

How Machine Data Supports GDPR Compliance
sponsored by Splunk
WHITE PAPER: Discover an overview of the GDPR and explore how machine data can help you meet the core requirements. Uncover the 3 ways machine data can help support your GDPR compliance program.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Splunk

4 Steps to Bolstering Public Cloud Security
sponsored by evident.io
RESOURCE: Discover a modern, cloud-native security approach that will bolster your public cloud's security with automation, real-time discovery, deep insights and robust reporting.
Posted: 24 May 2017 | Published: 24 May 2017

evident.io

SME cyber security is increasingly a business imperative
sponsored by ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

ComputerWeekly.com

Hybrid AI Takes on Cybersecurity
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Will hybrid AI disrupt your information security team? Experts agree that AI is the next step in identifying threats, but are we facing Westworld or just an evolutionary advancement? 7 security experts weigh in, inside this special report.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Arctic Wolf Networks, Inc.

Analyzing Ransomware and Potential Mitigation Strategies
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover how to apply a greylist approach to your ransomware prevention strategy, as well as 5 other recommendations.
Posted: 25 May 2017 | Published: 25 May 2017

CyberArk Software, Inc

A Closer Look at Cloud Migration Security Risks
sponsored by F5 Networks
EGUIDE: Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

Cloud Computing Top Threats
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and IntelĀ® Corporate
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement