Security Threats White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Security Threats

MORE SPECIFIC TOPICS:  Cross-Site Scripting |  Email Threats |  Internal Threats
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 1736 Matches
Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot
sponsored by Webroot
Case Study: | Posted: 18 Apr 2014
Published:28 Feb 2014
Summary:This brief case study shows how one organization deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Get This Now
Webroot

Download PHD Virtual Backup for Hyper-V, Free for 15 days
sponsored by PHD Virtual
Software Download: | Posted: 18 Apr 2014
Premiered:18 Apr 2014
Summary:This free trial provides PHD Virtual Backup for Hyper-V, an easy to use, flexible and affordable offsite backup and archiving solution.
Get This Now
PHD Virtual

How-to Build High Performance Security for the Software-Defined Data Center - Vendor Podcast
sponsored by Trend Micro
Podcast: | Posted: 18 Apr 2014
Premiered:Apr 11, 2014
Summary:Listen to this podcast for valuable information to consider when virtualizing your networks, especially with a whole new set of security risks to worry about. Click now for key recommendations to ensure a high-performance, secure network.
Get This Now
Trend Micro

Taking Managed Security Services To The Next Level
sponsored by Webroot
White Paper: | Posted: 18 Apr 2014
Published:31 Oct 2013
Summary:This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.
Get This Now
Webroot

Retail Cyber Crime
sponsored by LogRhythm, Inc.
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Get This Now
LogRhythm, Inc.

Network Monitoring and your SIEM Solution
sponsored by LogRhythm, Inc.
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This informative guide provides insight into an effective network monitoring solution and how it can enhance your SIEM strategy.
Get This Now
LogRhythm, Inc.

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks
sponsored by Lumension
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs.
Get This Now
Lumension

SC Magazine Security Brief: Server Side Risk
sponsored by Lumension
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks.
Get This Now
Lumension

The 5 Key Tactics for Dealing with Advanced Persistent Threats
sponsored by Lumension
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.
Get This Now
Lumension

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Get This Now
IntraLinks, Inc

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Get This Now
Websense

Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Get This Now
RSA, The Security Division of EMC

The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Get This Now
LogRhythm, Inc.

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Get This Now
LogRhythm, Inc.

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This paper introduces 10 of the most important vulnerability management, organized across the four key steps in the vulnerability management lifecycle.
Get This Now
Qualys

1 - 15 of 1736 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com