Kernel Root Kits White Papers

(View All Report Types)
Project Management and Collaborative Communication
sponsored by Tasktop
WHITE PAPER: This white paper explores how to create a connected software lifecycle to overcome data silos and enable end-to-end visibility for project management. Learn how to connect information across teams and departments to enhance project collaboration and create the communication that digital transformations, Agile, and DevOps principles demand.
Posted: 14 Mar 2017 | Published: 14 Mar 2017

Tasktop

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

HP Server Automation Virtual Appliance
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Read this exclusive white paper to find out the key features of HP's latest server automation software.
Posted: 27 Feb 2014 | Published: 31 May 2013

Hewlett Packard Enterprise

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

SaaS Takes Center Stage in 2014
sponsored by IBM
WHITE PAPER: Learn how subscription-based business applications are expected to make an even bigger impact in 2014 and beyond in this informative infographic.
Posted: 02 Oct 2014 | Published: 29 Jul 2013

IBM

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Taking Managed Security Services To The Next Level
sponsored by OpenText Security Solutions
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

OpenText Security Solutions

Securing your Midsized Business
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

Cyber Preppers Guide
sponsored by Threat Track Security
WHITE PAPER: This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
Posted: 22 May 2014 | Published: 14 May 2014

Threat Track Security