IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation White Papers (View All Report Types)
 
A WhiteHat Sentinel Product Family Overview
sponsored by WhiteHat Security
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

WhiteHat Security

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: Discover the 10 network security tools and tests that you should consider implementing and know how to use.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Global Knowledge

Mobile Threat Detection Through Machine Learning
sponsored by MobileIron
WHITE PAPER: Find out why some common solutions are less effective against modern threats and how machine learning security compares to cloud-based threat detection and traditional antivirus solutions.
Posted: 11 May 2018 | Published: 11 May 2018

MobileIron

The CSO Broad-Level Reporting Survival Guide
sponsored by BitSight
WHITE PAPER: This 16-page survival guide dives into advancing the CSO/CISO-board relationship and why the board needs security leaders to fuel disciplined growth. Uncover what the board wants, how to present to the board, and tips to communicate with the board.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

BitSight

Reimaging your Business Mean Imagining the Risk and the Mitigating it
sponsored by Advanced Business Software & Solutions
WHITE PAPER: Access this white paper to learn how to best prepare to mitigate risk throughout your digital transformation journey.
Posted: 03 May 2018 | Published: 03 May 2018

Advanced Business Software & Solutions

Where to Invest Next: Guidance for Maturing Cyber Defenses
sponsored by CrowdStrike
WHITE PAPER: Take a look at the security staffing, processes and technologies that are common to most mature and maturing organizations.
Posted: 16 May 2018 | Published: 16 May 2018

CrowdStrike

Using Microsegmentation to Implement a Zero Trust Model in the Cloud
sponsored by Unisys
WHITE PAPER: Learn about the Zero Trust Model in this white paper, and uncover 4 steps to building a Zero Trust Model in the cloud.
Posted: 11 May 2018 | Published: 11 May 2018

Unisys

Helping Address Your GDPR Needs
sponsored by Oracle Cloud
WHITE PAPER: Failing to secure your data is a risk that no organization should be willing to take. Access this resource to find out how your technology can be used to implement a robust security framework to help you address GDPR requirements.
Posted: 30 Apr 2018 | Published: 30 Apr 2018

Oracle Cloud

A Holistic Approach to Identity and Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase so does the potential for breaches via your physical and technology access points. Learn about identity and authentication tools to ensure your enterprise is fully protected.
Posted: 11 May 2018 | Published: 11 May 2018

HID Global

The Rebirth of Endpoint Protection
sponsored by NSS Labs
WHITE PAPER: Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement