IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats White Papers (View All Report Types)
 
Safeguard your devices against ransomware with Log360
sponsored by ManageEngine
WHITE PAPER: Network attack mechanisms continue to evolve on a daily basis. Of the network attacks that aim to steal or compromise data in some way, ransomware attacks have gained significance in recent times. In this white paper, learn how to properly implement and utilize SIEM as a defense against ransomware.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

The Practical Executive's Guide To Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: The important thing to realize is that it's not the technology behind data loss prevention (DLP) controls that ultimately determines your success—it's the methodology and execution strategy of your vendor that governs both your experience and results. In this white paper, explore a 9-step process for implementing and executing DLP controls.
Posted: 03 Apr 2019 | Published: 12 Nov 2018

Forcepoint

AllGoVision* and Intel Bring Advanced Video Analytics to the IoT Edge
sponsored by Intel
WHITE PAPER: Streaming video offers rich pools of data for many different use cases - one of the most obvious being security. Read this resource to learn how AllGoVision - powered by Intel® architecture - integrates with an existing infrastructure to prove near-real-time alerts and insights.
Posted: 22 Apr 2019 | Published: 31 Dec 2018

Intel

Armor File Integrity Monitoring (FIM)
sponsored by Armor
WHITE PAPER: When traditional firewalls or IDS fail to prevent or detect a threat, monitoring operating system and application changes at the host level provides an additional layer of security. In this white paper, learn more about Armor's File Integrity Monitoring which watches your hosts for unauthorized activities to detect potential threats.
Posted: 01 May 2019 | Published: 01 May 2019

Armor

Cybersecurity in Financial Services: Orchestrating the Best Defense in an Evolving Threat Landscape
sponsored by ServiceNow
WHITE PAPER: Financial Services has been a targeted sector and cybercrime is becoming sophisticated on an industrial scale. A more strategic and wholesale approach needs to be adopted industry-wide to fend off the threat. In this white paper, learn how organizations can leverage technology to get a holistic view of their entire business.
Posted: 24 May 2019 | Published: 28 Feb 2019

ServiceNow

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

CrowdStrike

Servers, Servers, Everywhere: How the Hybrid Cloud is a Game Changer for Security
sponsored by Trend Micro, Inc.
WHITE PAPER: While the hybrid cloud offers many benefits, it is important that existing architectures are maintained and secured. In this white paper, learn more about the dynamics of the hybrid cloud and the security challenges introduced at both the business and technical levels.
Posted: 05 Apr 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

Break the Link Between Users and Cyberthreats
sponsored by Avast Software
WHITE PAPER: Careless users, infected emails and unsafe or hijacked websites are a menace to SMBs. In this white paper, learn how a secure web gateway can help stop cyberthreats at the source.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Avast Software

How to Protect Your Business from a Magecart Data Skimming Attack
sponsored by Instart
WHITE PAPER: Data and credit card skimming attacks are especially worrying for online businesses. Skimming attacks have increased in scale and scope over the last decade, proving that these types of attacks continue to be a persistent security problem. In this white paper, learn why preventing data access is the only true defense against skimming attacks.
Posted: 16 Apr 2019 | Published: 30 Apr 2019

Instart
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement