IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Unstructured Internal Threats

RSS Feed    Add to Google    Add to My Yahoo!
Unstructured Internal ThreatsReports
 
Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

Securing WLANs with Two-factor Authentication
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007

RSA, The Security Division of EMC

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security
sponsored by Lumension
WHITE PAPER: Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter.
Posted: 10 Jun 2008 | Published: 15 May 2008

Lumension

Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER: Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Novell, Inc.

On Lockdown: HMV/Waterstone’s asserts control over user activity
sponsored by Safestone Technologies
CASE STUDY: Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Safestone Technologies

Outbound Email and Data Loss Prevention in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper overviews a survey completed by Proofpoint and Forrester Consulting that analyzes the legal, financial, and regulatory risks associated with outbound email in large enterprises.
Posted: 05 Feb 2009 | Published: 01 May 2008

Proofpoint, Inc.

Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER: Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Protecting Information from Insider Threats
sponsored by McAfee.
WHITE PAPER: Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

McAfee.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement