IT Management  >   Systems Operations  >   Security  >  


RSS Feed   
Threats White Papers (View All Report Types)
Monitoring Industrial Control Systems to Improve Operations and Security
sponsored by SecurityMatters
WHITE PAPER: Industrial Control Systems (ICS) sit at the core of every industrial process. This white paper details the pros and cons of several existing technologies that can be employed to monitor and protect ICS networks allowing organizations to best understand their environment and threat exposure throughout the entire security lifecycle.
Posted: 12 Feb 2018 | Published: 12 Feb 2018


WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

Information Protection in the Web and Cloud Era
sponsored by Symantec
WHITE PAPER: This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy, delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.
Posted: 13 Jun 2017 | Published: 13 Jun 2017


Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017


The Six Essential Capabilities of an Analytics Driven SIEM
sponsored by Splunk
WHITE PAPER: Legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Access this resource to uncover the 6 essential capabilities of an analytics-driven SIEM and learn how to keep your network secure.
Posted: 04 Aug 2017 | Published: 04 Aug 2017


Threat Visibility and the Zero-Trust Virtual Data Center
sponsored by McAfee, Inc.
WHITE PAPER: Explore how a network security platform can help make zero-trust networking supremely practical, prevent intrusions, and detect targeted threats.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

McAfee, Inc.

How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017


Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive
sponsored by Oracle Corporation
WHITE PAPER: In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way
Posted: 15 Sep 2017 | Published: 17 Nov 2017

Oracle Corporation

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement