Search Results for: Black Ice Defender firewall

The CISO's guide to supply chain security
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

TechTarget ComputerWeekly.com

Expert Guide to web 2.0 Threats: How to Prevent an Attack
A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.

TechTarget Security

Global Threats and an Intelligent Response
In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.

TechTarget Security

Advanced Virtualization E-Book - Chapter 3: Essentials of High-Availability Planning
Design, management and testing can make or break high availability in your virtual environment. Chapter 3 of this Advanced Virtualization E-Book discusses the essentials of high availability planning.

Dell, Inc. and Intel®

Information Security Magazine September 2011—Reader’s Choice Awards
Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.

Information Security Magazine

MicroScope August 2011: A special issue examining the cloud and the prospects for the channel
The cloud is a buzzword that crops up in almost every channel conversation but with questions still to be answered around the assistance vendors have given to resellers and the direction distributors are taking we provide some insight and analysis of the current views of just what the hosted option means for the channel.

MicroScope

Computer Weekly – 19 December 2017: Navigating through digital change
In this week's Computer Weekly, IT leaders share the lessons learned and discuss best practice in digital transformation. We find out how SAP is addressing customer concerns about its indirect licensing policies. And we assess whether SME IT suppliers are making headway in selling to government CIOs. Read the issue now.

TechTarget ComputerWeekly.com

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.

TechTarget Mobile Computing

Your Hybrid Infrastructure Is Under Attack
In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.

Palo Alto Networks

Straddling the Security Divide Between On Premises and Cloud
Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.

TechTarget Security