Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software White Papers (View All Report Types)
1 - 25 of 273 Matches Previous Page  |  Next Page
Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

The Rebirth of Endpoint Protection
sponsored by NSS Labs
WHITE PAPER: Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs

Fighting Fraud with Unified Data
sponsored by Adyen
WHITE PAPER: Explore how unified commerce can give retailers a metric to detect potential fraud and note transactions that do not fit a customer's established pattern.
Posted: 07 Feb 2018 | Published: 30 Nov 2017


Modern IAM: Build Trust Without Sacrificing Security
sponsored by CA Technologies
WHITE PAPER: This white paper outlines how a modern identity and access management system can help build trust between yourself and your users without infringing on their freedom.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

CA Technologies

Unified Threat Management (UTM) Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: Click inside to learn the 4 aspects that any good unified threat management (UTM) system has, as well as a buyer's checklist to make sure you have everything you need.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Fortinet, Inc.

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 23 Jan 2018 | Published: 03 Aug 2017

Splunk

Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Unified Threat Management: A Modern Solution to a Modern Problem
sponsored by Seqrite
WHITE PAPER: Read this white paper to learn why traditional methods of network protection are no longer sufficient to keep your data safe from today's advanced threats. Then, discover unified threat protection which uses a single appliance to perform many security functions.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Threats Posed by Portable Storage Devices
sponsored by Seqrite
WHITE PAPER: In this white paper, find out if security policies alone are the best solution to mitigate the risks posed by portable storage devices, as well as explore some of the threats that these devices pose if they go uncontrolled.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

Protecting Your Enterprise from Ransomware Attacks
sponsored by Seqrite
WHITE PAPER: Click inside to take a more in-depth look at what makes a ransomware attack unique, and why you need to take steps to protect yourself. Then, learn about 5 protection mechanisms you can put into place.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

Security Investigations: The Importance of Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec
WHITE PAPER: Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec

9 Ways to Solve the GDPR Compliance Challenge
sponsored by Symantec
WHITE PAPER: This white paper explores 9 technologies that can help you meet GDPR compliance and avoid the hefty fines associated with it.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec

Information Protection in the Web and Cloud Era
sponsored by Symantec
WHITE PAPER: This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy, delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec
WHITE PAPER: This guide examines 6 important issues to consider when moving enterprise data and applications to the cloud. Learn how to navigate the perils of complexity through smart policies, consider data loss prevention issues, and 4 more ways to migrate to the cloud responsibly.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

8 Things to Know About a Secure Web Gateway
sponsored by Symantec
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid

Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive
sponsored by Oracle Corporation
WHITE PAPER: In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way
Posted: 15 Sep 2017 | Published: 17 Nov 2017

Oracle Corporation

How You can Secure the Use of Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Symantec

Combining Data Loss Protection with Cloud Access Security Broker Technology
sponsored by Symantec
WHITE PAPER: Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

Symantec

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro
1 - 25 of 273 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement