IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat MitigationReports
 
Mitigating User-Based Risks: Where Infrastructure Monitoring Falls Short, User-Based Monitoring Excels
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper reveals the results of a study on why senior executives must get involved in breach management.
Posted: 06 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Utilizing Security Ratings for Enterprise IT Risk Mitigation
sponsored by BitSight
WHITE PAPER: Continue on to this important whitepaper now to explore the state of cyber-risk management in 2014.
Posted: 20 Nov 2014 | Published: 18 Jun 2014

BitSight

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett-Packard Company

How Often Should IT Security and Firewalls be Upgraded?
sponsored by Icomm Technologies
VIDEO: Download this exclusive video now to learn about important lifecycle consideration factors, like cost and firmware upgrades, and much more.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

Icomm Technologies

Cisco 2014 Midyear Security ReportĀ - Executive Summary
sponsored by Cisco
WHITE PAPER: Download this exclusive whitepaper now for an overview of the security landscape midway through 2014, including threat intelligence, rising trends, and much more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Cisco

Ponemon Cost of Cyber Crime Study: Global Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 19 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

Remove Vulnerabilities by Fortifying Security Basics
sponsored by Icomm Technologies
VIDEO: This valuable video explores how many companies are dropping the ball when it comes to the security basics.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

Icomm Technologies

Information-Driven Security through RSA Security Analytics 10.4 and RSA ECAT 4.0
sponsored by RSA
VIDEO: Learn what CISOs can do to better protect their organizations from security breaches, and why a Big Data security analytics architecture is necessary for threat detection and response.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

RSA

Demo: RSA Security Analytics and RSA ECAT
sponsored by RSA
VIDEO: See key features of RSA Security Analytics 10.4 and RSA ECAT 4.0 in action including log collection, packet analysis, the addition of Netflow, and real-time malware analysis on the endpoint.
Posted: 27 Oct 2014 | Premiered: 27 Oct 2014

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement