Security Threats White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Security Threats

MORE SPECIFIC TOPICS:  Cross-Site Scripting |  Email Threats |  Internal Threats
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 1899 Matches
The new reality of mobile solutions: Everything you’ve been told about mobility is wrong
sponsored by Dell, Inc.
White Paper: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:This white paper breaks down four huge misconceptions about mobility that is scaring organizations away from going mobile. It also provides ways to easily overcome any barriers to mobility across your organization by objectively matching the best mobility strategy to your unique IT requirements, business goals and user group needs.
Get This Now
Dell, Inc.

BlackBerry COBO: Ultimate Mobile Security and Control
sponsored by BlackBerry
White Paper: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:When security and control are of paramount concern a COBO option can provide optimal protection against data loss and strict compliance with regulatory requirements. Read this whitepaper if you want to know your high-security users are equipped with mobile computing and communications capabilities that meet your corporate-only requirements.
Get This Now
BlackBerry

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
White Paper: | Posted: 30 Jul 2014
Published:29 Jun 2013
Summary:In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Get This Now
Cyber-Ark Software

Advanced Evasion Techniques For Dummies
sponsored by McAfee, Inc.
eBook: | Posted: 30 Jul 2014
Published:31 Dec 2013
Summary:In this in-depth eBook, you'll learn about the different kinds of cybercrime organizations are up against today, and the best strategies to protect yourself from these advanced evasions and attacks.
Get This Now
McAfee, Inc.

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
Video: | Posted: 30 Jul 2014
Premiered:17 Apr 2014
Summary:This webinar gives a description of distributed denial-of-services attacks and explains the benefits of a DDoS mitigation solution.
Get This Now
Fortinet, Inc.

What's Behind a Cyber Attack?
sponsored by IBM
White Paper: | Posted: 29 Jul 2014
Published:30 Apr 2014
Summary:This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Get This Now
IBM

DCIG Buyer's Guide 2014-15: SIEM Appliances
sponsored by LogRhythm, Inc.
White Paper: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Get This Now
LogRhythm, Inc.

Introducing LogRhythm v6.2
sponsored by LogRhythm, Inc.
White Paper: | Posted: 29 Jul 2014
Published:30 Apr 2014
Summary:Although security professionals do as much as they can to prevent error or risks, they must always be prepared for something to go wrong. Now they can with a powerful monitoring and auditing platform that keeps security personnel informed with an excellent investigatory tool.
Get This Now
LogRhythm, Inc.

How MSPs Can Help SMBs Prevent Irreparable Data Loss
sponsored by N-able Technologies
White Paper: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:This resource answers a number of questions that MSPs may have regarding helping their customers to protect their critical data from loss, and also provides a list of items to look for when choosing a managed backup solution.
Get This Now
N-able Technologies

Simple Steps to Prevent Data Theft
sponsored by HID
White Paper: | Posted: 29 Jul 2014
Published:26 Jun 2014
Summary:This white paper talks about the recent data breaches that have happened in the retail and financial services sector recently and describes 4 steps that can be taken to prevent data theft.
Get This Now
HID

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Get This Now
Symantec Corporation

Enterprise Information Security in Transition
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:31 Oct 2012
Summary:This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Get This Now
IBM

Extending Security Intelligence with Big Data
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:31 Jan 2013
Summary:This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Get This Now
IBM

Exposing the Cybersecurity Cracks: Australia
sponsored by Websense, Inc.
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:The following report learn how better communication and information about cybersecurity, the right investment in skilled personnel, enabling technologies, and the adoption of security measures will minimized the risk of current and emerging cyber threats.
Get This Now
Websense, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:25 Jun 2014
Summary:This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Get This Now
IBM

1 - 15 of 1899 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com