IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
The Rebirth of Endpoint Protection
sponsored by NSS Labs
WHITE PAPER: Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs

Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

WAF and DDoS: Perfect Bedfellows
sponsored by Radware
RESOURCE: This resource explains how DDoS and WAF strategies should be integrated together to improve attack mitigation capabilities while maintaining customer expectation.
Posted: 23 Feb 2018 | Published: 23 Feb 2018

Radware

Unlock Business Opportunity without Taking Security Risks
sponsored by Juniper Networks
WHITE PAPER: This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

2017's 5 Most Dangerous DDoS Attacks & Steps to Mitigate Them
sponsored by Radware
RESOURCE: Learn the 5 most dangerous attacks in 2017 and the steps to protect your organization's network.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Radware

The Five Milestones to GDPR Success
sponsored by Citrix
RESEARCH CONTENT: This Forrester Research Report details how to achieve 5 key milestones to have GDPR success by the May 2018 deadline.
Posted: 30 Jan 2018 | Published: 25 Apr 2017

Citrix

Meltdown Spectre Mitigation with PowerShell and Process Automation
sponsored by Goverlan
WEBCAST: Uncover a deep dive into the Meltdown and Spectre security holes. This webinar details how to deploy security patches in a timely and systematic fashion on a large scale.
Posted: 02 Feb 2018 | Premiered: Jan 26, 2018

Goverlan

Why Deception is Essential to Your Cybersecurity Strategy
sponsored by Illusive Networks
RESEARCH CONTENT: The average time that attackers live inside an enterprise network before being detected is 146 days. This Frost and Sullivan report details how deception security technologies can speed up detection and cause attackers to expose their vulnerabilities.
Posted: 08 Feb 2018 | Published: 28 Feb 2017

Illusive Networks

The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Is My Smart Home Telling People What I Do Every Day?
sponsored by Radware
RESOURCE: Click inside to learn about the current state of smart home security, as well as some steps providers should take in the near future to protect their customers.
Posted: 07 Mar 2018 | Published: 13 Feb 2018

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement