IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation Reports
 
Respond to Threats Faster and More Effectively Than Ever
sponsored by ServiceNow
WEBCAST: Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.
Posted: 30 Jan 2017 | Premiered: Jan 30, 2017

ServiceNow

Advanced Threat Protection: Putting a Solid Sandbox Strategy in Place
sponsored by Dell SonicWALL
WHITE PAPER: Learn how to create a sandbox strategy that maximizes traffic visibility (including encrypted traffic), uses multiple detection methods (leveraging sandboxing, along with passive signature based and heuristic scanning), and possesses an architecture that balances performance, implementation costs and an inability to be detected.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Dell SonicWALL

6 Tips to Maximize Productivity with Identity-as-a-Service (IDaaS)
sponsored by Microsoft
WHITE PAPER: Identity-as-a-Service (IDaaS) is an emerging strategy for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. Learn the top six considerations to keep in mind when selecting your IDaaS.
Posted: 26 Jan 2017 | Published: 22 Jun 2015

Microsoft

Do You Trust Your Network Security?
sponsored by Ixia
WHITE PAPER: Protecting your network requires a deeper strategy than simply buying security inspection tools, integrating them, and expecting them to comprehensively inspect all of your traffic. Learn how to test your network elements before you go live in order to provide your organization the confidence that your network can survive an attack.
Posted: 06 Feb 2017 | Published: 30 Dec 2016

Ixia

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
PODCAST: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 21 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Why SSL Decryption is Critical for Today's Secure Web Gateways & 5 Keys to an Effective Solution
sponsored by ContentKeeper
WHITE PAPER: Discover why SSL decryption is a critical component for today's secure web gateways; and illustrated is a 5-point framework for evaluating these gateways to ensure you handle decryption successfully. Read on to also address the challenges associated with SSL decryption and how these created a big gap in effectiveness among solutions.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

How the Houston Astros Protected their Network from Internet Threats
sponsored by ContentKeeper
CASE STUDY: Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

The Mimecast Email Security Risk Assessment 2017
sponsored by Mimecast
WHITE PAPER: By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement