IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed   
Active Security Solutions White Papers (View All Report Types)
Breach Prevention: The New Way Forward
sponsored by NSS Labs
WHITE PAPER: Attackers are able to bypass traditional endpoint and perimeter-based security solutions. This white paper explains why organizations are adopting breach detection systems (BDS) to evolve with the ever-changing threat landscape.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

NSS Labs

Aggregate, Protect, Share: Technologies to Help Health IT Protect and Manage
sponsored by IBM
WHITE PAPER: Security breaches in healthcare organizations are climbing. Inside, discover why healthcare organizations must implement more comprehensive, integrated security solutions to stay compliant, and how using a single data protection infrastructure can protect data from security breaches.
Posted: 01 Mar 2018 | Published: 30 Nov 2017


Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: Read this white paper to find out what new security concerns are driving the need for risk adaptive protection. Then learn about a data protection method that focuses on people for visibility into the data they create and the applications they use.
Posted: 29 Jan 2018 | Published: 29 Jan 2018


Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

How to Improve Security with Network Packet Visibility
sponsored by ADLINK Technology
WHITE PAPER: Access this white paper to learn how real-time analysis of network traffic exposes malicious attacks and enhances information security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

ADLINK Technology

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018


Why all Companies Should Require Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: In this white paper, learn why your organization should adopt a digital risk management strategy to mitigate corporate risk and the first 2 steps to getting started.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

The Mobility Landscape: Goals and Challenges
sponsored by MicroStrategy Incorporated
WHITE PAPER: Download this white paper for an outline of the mobility landscape, businesses top goals for mobility initiatives, and how to minimize the challenges to mobility.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

MicroStrategy Incorporated

The Top 5 Requirements to Look for in Your Network Security Policy Management Solution
sponsored by FireMon
WHITE PAPER: In the last 20 years, network security policies have grown by more than 3,500%, according to FireMon.This resource examines the top 5 requirements to look for in your networking security policy management strategy.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement