IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed   
Computer Security Threats White Papers (View All Report Types)
Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Arctic Wolf

Speed and Scalability Matter: Review of LogRhythm 7 SIEM and Analytics Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: Find out how SANS Institute put the LogRhythm 7.2 Threat Lifecycle Management Platform to the test and see whether or not this SIEM platform is right for your enterprise.
Posted: 09 Aug 2018 | Published: 28 Feb 2018

LogRhythm, Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 01 Aug 2018 | Published: 02 Feb 2018

Veracode, Inc.

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: In this white paper, find out why cybersecurity must evolve into a platform-based, intelligence-drive approach to identify, manage and block threats faster. To close the detection gap and better manage cyber risk, cybersecurity teams must capture, process, and analyze exponentially increasing threat data all in one platform.
Posted: 05 Oct 2018 | Published: 05 Oct 2018


Advanced Endpoint Protection Test
sponsored by Bitdefender
WHITE PAPER: An advanced endpoint protection test was conducted to look at the proactive protection, exploit, false alarm, and ransomware capabilities of Bitdefender's product, GravityZone Elite Security, against 9 of its competitors. Read on for the results.
Posted: 08 Oct 2018 | Published: 30 Nov 2017


Competitive System Resource Impact Testing
sponsored by Cylance
WHITE PAPER: Download this whitepaper for a look at the several tests conducted to determine the impact on a computer system and the user's ability to perform several common actions and their impact while detecting and quarantining malware. Read on to see the results.
Posted: 27 Aug 2018 | Published: 27 Aug 2018


How ThreatConnect Leverages DNSDB to Track Down Grizzly Steppe
sponsored by Farsight Security
WHITE PAPER: Find out how ThreatConnect used a passive DNS database intelligence approach to extend Grizzly Steppe data from the Joint Analysis Report and discover new indicators that expose cyberespionage activity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Farsight Security

Fighting Fraud with Intelligent Access Management
sponsored by IBM
WHITE PAPER: Find out how you can become a leader in the fight against fraud with intelligent access management and authorization, designed for holistic fraud prevention.
Posted: 24 Jul 2018 | Published: 31 Jul 2016


Transform Your IT Security in 3 Steps
sponsored by VMware
WHITE PAPER: Security is critical; it should be on the mind of every business, and it should never be sacrificed at the expense of some other endeavor. Download this white paper to unveil 3 focus areas for transforming your IT security into a reliable workhorse for the digital workspace.
Posted: 31 Jul 2018 | Published: 31 Dec 2017


Your People are Your Biggest IT Security Threat
sponsored by Rackspace Microsoft
WHITE PAPER: Take a look at the top 3 human risks and learn how training and risk controls can help to mitigate these threats.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Rackspace Microsoft

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement