IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
Beyond FTP: Securing and Managing File Transfers
sponsored by HelpSystems
WHITE PAPER: This white paper examines how IT security teams can bring the implementations of file transfer protocol (FTP) into a more modern, secure framework to increase user productivity and enhance the manageability of file transfers.
Posted: 26 Jun 2018 | Published: 26 Jun 2018

HelpSystems

How to Mitigate 5 Network Security Problems Affecting the Financial Industry
sponsored by Ixia - Keysight
WHITE PAPER: Find out how high-priority targets like financial industry organizations can overcome 5 critical IT security challenges, from reducing cybertheft to improving compliance.
Posted: 29 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

What Happens When a Business Decides to Prevent Attacks Instead of React to Them?
sponsored by Cylance
VIDEO: Formel D is the global service provider for the automotive industry, where Global IT Manager Robert Osten oversees the teams responsible for building and maintaining the company's network in regards to threats. In this video, learn how Formel D used Cylance for their security needs, and how it compared to other systems they used in the past.
Posted: 12 Jun 2018 | Premiered: 23 May 2017

Cylance

Beyond Device Recognition
sponsored by iovation, Inc.
VIDEO: Find out how to strike the balance between cybersecurity and user accessibility for devices on-the-go with advanced device intelligence that uses device behavior, content, and reputation to stop fraud in its tracks.
Posted: 18 Jun 2018 | Premiered: 18 Jun 2018

iovation, Inc.

DDoS Mitigation and SSL Attack Protection Case Study
sponsored by Radware
CASE STUDY: In this case study, find out how one financial services company tag-teamed network security by adopting an on-premise DDoS appliance and SSL attack mitigation software to overcome the increased rate of cyberattacks assailing their organization.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Radware

HSM Reimagined: Cloud Ready Encryption, Key Management and Tokenization as a Service
sponsored by Equinix
RESOURCE: More data in multi-cloud environments present increased security challenges, including the inability to obtain total control of encryption keys and data, malicious attacks and more. Learn how HSM as a Service provides cloud-ready encryption, key management and much more to help you stay protected.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Equinix

A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: Even for enterprises, fraud is a real burden and risk, which Verizon's DBIR says is costing you. Download this white paper to uncover 6 real-world scenarios that show the benefits of using machine learning to stay ahead of fraud.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Splunk

The Complete Security Guide for Cloud-Based Businesses
sponsored by Vera
EBOOK: Unlock this 10-page complete security guide to learn how a data-centric security approach allows cloud-based enterprises to secure data through its entire life cycle, everywhere it travels, no matter who has it or where it is stored.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Vera

DDoS Defense: EMEA Multinational Banking Group Case Study
sponsored by Radware
CASE STUDY: Find out how one EMEA-based financial services company implemented an on-premise DDoS mitigation appliance along with cloud-based services designed to combat against DDoS and other encrypted threats.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement