Standards  >  

Security Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Security Protocols Reports
 
Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences
sponsored by NICE Systems, Inc
WHITE PAPER: Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.

AI, Risk-Based and Context: Trading in Your Password for the Intelligent Future
sponsored by Crossmatch
TRANSCRIPT: Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Crossmatch

7 Questions to Ask Before Choosing a Threat Intelligence Feed for Web-Based Threats
sponsored by The Media Trust
WHITE PAPER: Learn 7 questions that you need to ask of your threat intelligence feed to determine what's best for your enterprise's security, what makes a truly valuable threat intelligence feed, and more.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

The Media Trust

Analyzing the Malware Threat
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec & Blue Coat Systems

Ransomware: The Most Profitable Malware in History
sponsored by Cisco Umbrella
RESOURCE: Learn how to combat ransomware with four resources, including a blog post that details ransomware's past, present and future and a slideshow of ten shocking new facts about ransomware.
Posted: 30 May 2017 | Published: 30 Dec 2016

Cisco Umbrella

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec & Blue Coat Systems

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

How the Basics of Network Security Have Evolved
sponsored by Fortinet, Inc.
EGUIDE: In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
Posted: 09 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement