IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat MitigationReports
 
Protection for Every Enterprise: Maximizing Mobile Security
sponsored by BlackBerry
WHITE PAPER: In this helpful white paper, get the facts on mobile security and the best protections strategies from today's advanced cyber threats.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security

Stop Password Sprawl with SaaS Single Sign-On via Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Access this white paper to get a better understanding of the challenges to adopting SaaS applications, hidden costs of SaaS, and security issues with SaaS apps. Read on to learn more about bolstering your cloud security efforts and stopping password sprawl.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

2014 Global Threat Intelligence Report
sponsored by Solutionary
RESOURCE: This critical report outlines today's most dangerous cyber threats and the key security strategies that will keep your organization protected.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Solutionary

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce
sponsored by Absolute Software
CASE STUDY: This case study reveals how Intelligrated found a solution that would allow them to track and secure laptops in the field, in order to avoid any potential laptop theft.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

Absolute Software

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

How to Reverse Engineer Domain Ownership in a Cyber Investigation
sponsored by DomainTools
WHITE PAPER: In this in-depth resource, discover the top security strategies that can help security uncover vital insights into the true identify of cyber attackers.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Vendor Landscape: Intrusion Detection & Prevention Systems
sponsored by IBM
WHITE PAPER: Check out this helpful resource to get an inside evaluation of today's IDPS vendors and products, and uncover which are the best fit for your enterprise needs.
Posted: 12 Sep 2014 | Published: 31 Dec 2012

IBM

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement