IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation White Papers (View All Report Types)
 
Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

SOC-as-a-Service for Financial Institutions
sponsored by Arctic Wolf
WHITE PAPER: Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

Empowering Big Data in a Data-driven Economy
sponsored by comForte GmbH
WHITE PAPER: Fewer things have been more transformational in IT than the rise of Big Data. It has given organizations the ability to use, monetize, and learn from data. However, bad actors also know the value of data so the threats are real. In this white paper, learn how to protect your most valuable asset: data.
Posted: 15 Jan 2019 | Published: 15 Jan 2019


Using Splunk Adaptive Response
sponsored by Splunk
WHITE PAPER: Adaptive response enables security analysts – from hunters to less skilled security staff – to better handle threats by speeding the time to make decisions and actions when responding and adapting to them. Read this white paper to learn about the adaptive response framework capabilities and adaptive response initiative partner integrations.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Splunk

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Security and Compliance Mandates Can Be Draining. Here's How to Recharge.
sponsored by OneNeck IT
WHITE PAPER: It is easy to be overwhelmed by security threats and data breaches however; there are a number of simple yet effective steps you can take right now to regain your focus and control. In this white paper, discover 5 steps to recharging your security and compliance efforts.
Posted: 07 Jan 2019 | Published: 07 Jan 2019

OneNeck IT

PCI Compliance: Employee Awareness is Key
sponsored by MediaPRO
WHITE PAPER: Learn how to arm your employees with the knowledge they need to keep your customers' data secure, while mastering the PCI-DSS standards.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

MediaPRO

Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

A CISO Guide to Modern Security Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, learn how implementing a modern security architecture can secure your entire organization, meet the demands of compliance, and proactively manage risk.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

Fortinet, Inc.

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement