IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed   
Network Threats White Papers (View All Report Types)
 
The Truths and Lies of IoT Security: Monitoring Connected Devices
sponsored by MASERGY
WHITE PAPER: As the Internet of Things (IoT) accelerates the pace of the enterprise with data-driven decision making, CEOs, CIOs, and CISOs are making the dash for the IoT playing field. But how do they get in the game while not jeopardizing security? In this white paper, learn about key security considerations for IoT.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

MASERGY

Armor File Integrity Monitoring (FIM)
sponsored by Armor
WHITE PAPER: When traditional firewalls or IDS fail to prevent or detect a threat, monitoring operating system and application changes at the host level provides an additional layer of security. In this white paper, learn more about Armor's File Integrity Monitoring which watches your hosts for unauthorized activities to detect potential threats.
Posted: 01 May 2019 | Published: 01 May 2019

Armor

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER: As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by comForte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

Faster Response With Crowdstrike and MITRE ATT&CK™
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

CrowdStrike

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organizations can take to build a people-centric defense.
Posted: 21 Jun 2019 | Published: 31 Jan 2019

Proofpoint

Servers, Servers, Everywhere: How the Hybrid Cloud is a Game Changer for Security
sponsored by Trend Micro, Inc.
WHITE PAPER: While the hybrid cloud offers many benefits, it is important that existing architectures are maintained and secured. In this white paper, learn more about the dynamics of the hybrid cloud and the security challenges introduced at both the business and technical levels.
Posted: 05 Apr 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

9 Common Security Mistakes Your Organization Might Be Making
sponsored by Involta
WHITE PAPER: Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER: Organizations are under constant threat from a barrage of scans and attacks delivered across IP traffic. In this white paper, learn how Armor's Dynamic Threat Block (DTB) is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack.
Posted: 08 May 2019 | Published: 08 May 2019

Armor

Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
WHITE PAPER: Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement