IT Management  >   Systems Operations  >  

System Security

RSS Feed   
System Security White Papers (View All Report Types)
 
Secure Data Acquisition, Communication and Processing for Your IoT Solutions
sponsored by Telit
WHITE PAPER: This white paper explores the 3 pillars of IoT network security and offers advice on how you can overcome the impending cybersecurity threats while maintaining the agility you need to gain a competitive advantage.
Posted: 23 Mar 2018 | Published: 23 Mar 2018

Telit

What the Hybrid Cloud is Not: Urban Myths About the Multi-Cloud World
sponsored by Concerto Cloud Services
WHITE PAPER: Many CIOs are wary of migrating apps and data due to lingering myths from cloud's early days. This paper busts the top five myths surrounding hybrid cloud, exposing what cloud is really capable of, and why now is the time to get on board with hybrid cloud.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Concerto Cloud Services

Web Application Firewall (WAF) Security Value Map
sponsored by Citrix
WHITE PAPER: This resource shines light into an independent test and provides detailed information about Citrix's web application firewall product, including its security effectiveness, performance, and TCO.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Citrix

The Rebirth of Endpoint Protection
sponsored by NSS Labs
WHITE PAPER: Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs

Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.
sponsored by Juniper Networks
WHITE PAPER: Inside this white paper, access your cybersecurity checklist to learn why traditional defenses are not working and how to prevent the increase of cybercrime in today's digital era.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017

Radware

Why Mobile Device Event Correlation Matters
sponsored by SyncDog
WHITE PAPER: A recent study by Gartner reveals 3 key challenges enterprises will deal with as more personal phones and tablets invade the workplace: governance and compliance, mobile device management, and security. Learn how to deal with these challenges head-first inside this white paper.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

SyncDog

DPI and Cloud Computing Security Platforms for the IoT Era
sponsored by ADLINK Technology
WHITE PAPER: As IoT continues to grow, the security of networks is at risk. This resource offers strategies for securing network devices used in PDI for cloud computing security as well as an approach to integrating hardware and software to address new security requirements of the IoT era.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

ADLINK Technology

Automate Firewall Change Management
sponsored by Skybox Security
WHITE PAPER: This white paper examines the current challenges in managing firewall changes, the typical firewall change management cycle and the concepts of an automate workflow system that addresses these challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement