IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation White Papers (View All Report Types)
 
CNP Fraud in Jewelry & Watch Sales
sponsored by Riskified
WHITE PAPER: Online watch and jewelry retailers often struggle to find a balance between CNP fraud prevention and providing a smooth shopping experience. Download this report to learn about online fraud prevention in this industry, and how to improve security without negatively affecting customer experience.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Riskified

The 6 Business and Security Benefits of Zero Trust
sponsored by Akamai Technologies
WHITE PAPER: Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Find out how your enterprise can benefit from zero trust, today.
Posted: 06 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

How To Succeed in Data Loss Prevention (DLP) Projects
sponsored by Docauthority
WHITE PAPER: Inside, find out how AI and document security, combined with your DLP project, can help you to significantly improve the coverage for the data protected.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Docauthority

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: In this white paper, explore a step-by-step journey on how to detect unknown malware activity and early signs of compromise in a Windows environment and find out how security analysts can gain a significant understanding of detailed activities on endpoint.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Splunk

Combating the Top Five Cyberattacks with Managed Detection and Response
sponsored by Arctic Wolf
WHITE PAPER: This white paper walks through the top 5 security attacks, by providing insights into tactics, techniques and procedures commonly used by threat actors. Then, find out how a managed detection and response strategy can take your security protocols to the next level and protect your organization.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Arctic Wolf

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 01 Aug 2018 | Published: 02 Feb 2018

Veracode, Inc.

PIM, PAM and PUM: 2018 Fundamentals and Best Practices for Linux/Unix Privileged Identity and Access Management
sponsored by HelpSystems
WHITE PAPER: This white paper touches on the importance of PIM, PUM and PAM understanding and planning. Find out how you can transform your multi-vendor Linux and Unix server environment into one centrally managed security domain to simplify security policies and control access rights.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

Security Transformation Requires a Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Find out how to build your security transformation strategy for the growing attack surfaces of digital-first businesses that increasingly rely on IoT, SDN, mobile, and multi-cloud technologies.
Posted: 25 May 2018 | Published: 25 May 2018

Fortinet, Inc.

Protect Your Data At Every Point Possible
sponsored by Dell EMC and IntelĀ®
WHITE PAPER: To support the accelerating data rise, companies are turning to cloud-based, cost-effective, virtualization-ready data protection solutions. Inside, you'll get an overview of the Dell EMC Data Protection portfolio designed to add agility and cut costs.
Posted: 31 May 2018 | Published: 31 May 2018

Dell EMC and IntelĀ®

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: How have SIEM platforms evolved? This SIEM Buyer's Guide reveals the differences between modern SIEM and legacy SIEM and offers 9 technical capabilities of a modern SIEM strategy and how it can improve your overall security.
Posted: 23 May 2018 | Published: 23 May 2018

Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement