IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation Reports
 
Taking Managed Services to the Next Level
sponsored by Datto, Inc.
EBOOK: As the threat landscape changes, security providers must also adapt. In this e-book, learn what it takes to protect against WannaCry and other new attacks, the answer to FAQs about lead generation, Ransomware growth broken down by the numbers, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Datto, Inc.

Equinix Delivers Security Intelligence with Cloud-Based SIEM
sponsored by Splunk
CASE STUDY: Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Splunk

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

Evolution of the Online Battlefield
sponsored by Armor
WHITE PAPER: From botnets to APTs and DDoS attacks, learn more about the history of cyberattacks and how they've shaped the current threat landscape.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Fortinet, Inc.

CyberSecurity in 2017: Can Business Really Be Secure?
sponsored by AdvizeX Technologies
RESOURCE: As technology and criminals both advance at lightning speed, can you really be sure that your business is secure? As you introduce tools for productivity, are you also opening yourself to attack? Access this report from cybersecurity expert Sam Cattle.
Posted: 07 Aug 2017 | Published: 09 Feb 2017

AdvizeX Technologies

IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Endpoint Security Review: Cb Defense
sponsored by Carbon Black
PRODUCT REVIEW: Peter Stephenson, technology editor of SC Magazine weighs the strengths and weaknesses of endpoint security vendor Carbon Black's Cb Defense tool. In his review, uncover an in-depth analysis and see how he rated the platform.
Posted: 11 Aug 2017 | Published: 09 Aug 2017

Carbon Black

IT Managers Survival Guide for Moving Your Fax Infrastructure to the Cloud Webinar
sponsored by J2 Cloud Services
WEBCAST: In this webinar, listen to Michael Flavin, Senior Product Marketing Manager, j2 Cloud Services about common misconceptions about cloud computing and the 10 key questions your organization should be asking when evaluating cloud providers.
Posted: 14 Sep 2017 | Premiered: Jun 4, 2015

J2 Cloud Services

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Recent SC Media research reveals that 46% of security pros expect threat intelligence to be a very important part of their strategy. This white paper takes an in-depth look into threat intelligence, one of the most talked-about areas of information security.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement