All resources sponsored by:

SearchSecurity.com

1 - 25 of 99 Matches
Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK:FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014
Get This Now


Information Security Magazine – April 2014
sponsored by SearchSecurity.com
EZINE:In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
Posted: 01 Apr 2014 | Published: 01 Apr 2014
Get This Now


Information Security ASEAN March 2014
sponsored by SearchSecurity.com
EZINE:This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
Get This Now


Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE:This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
Get This Now


What’s the Best Focus for MDM Strategy Now?
sponsored by SearchSecurity.com
EBOOK:This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
Posted: 12 Mar 2014 | Published: 12 Mar 2014
Get This Now


Technical Guide on Application Security
sponsored by SearchSecurity.com
EZINE:This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Posted: 06 Mar 2014 | Published: 31 Dec 2012
Get This Now


Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE:In this Insider Edition, we'll examine the recent advances in advanced malware detection and prevention as well as which ones are likely to bear fruit in your organization.
Posted: 05 Mar 2014 | Published: 05 Mar 2014
Get This Now


Information Security Magazine – March 2014
sponsored by SearchSecurity.com
EZINE:In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation.
Posted: 03 Mar 2014 | Published: 03 Mar 2014
Get This Now


Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014
Get This Now


Unified Threat Management: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK:To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
Get This Now


Unified Threat Management: Decision Time
sponsored by SearchSecurity.com
EBOOK:Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
Get This Now


Unified Threat Management: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK:Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014
Get This Now


SIEM Technical Guide
sponsored by SearchSecurity.com
EGUIDE:This TechGuide examines the policies and enhanced monitoring needed from a SIEM to make smarter decisions and respond faster to incidents.
Posted: 19 Feb 2014 | Published: 19 Feb 2014
Get This Now


Security University: Security Analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014
Get This Now


Information Security Magazine
sponsored by SearchSecurity.com
EGUIDE:In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
Posted: 03 Feb 2014 | Published: 03 Feb 2014
Get This Now


PCI DSS 3.0: The Expert's Guide to the New Guidance
sponsored by SearchSecurity.com
EGUIDE:This SearchSecurity.com Editorial TechGuide gives an overview of the major changes with PCI DSS 3.0, outlines where procedures and policies remain unclear, and closes with a practical list of the top five ways this new standard affects merchants.
Posted: 31 Jan 2014 | Published: 31 Jan 2014
Get This Now


SearchSecurity.com University: Web-bourne Malware
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This lesson examines trends in Web-borne malware, including contemporary attacker and malware trends, and recent cutting-edge attack methods, and details the technologies and tactics enterprises can put in place to achieve "quick wins" to reduce malware risk and long-term strategies to harden browsers, enhance detection and educate users.
Posted: 14 Jan 2014 | Premiered: 15 Jan 2014
Get This Now


SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013
Get This Now


Restore Balance with Next Generation Authentication Technical Guide
sponsored by SearchSecurity.com
EGUIDE:Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Posted: 21 Nov 2013 | Published: 21 Nov 2013
Get This Now


Beating Back Malicious Mobile Apps Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013
Get This Now


November Information Security Magazine
sponsored by SearchSecurity.com
EZINE:Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change.
Posted: 31 Oct 2013 | Published: 31 Oct 2013
Get This Now


Handbook: Vulnerability Management
sponsored by SearchSecurity.com
EGUIDE:This TechGuide will help you both identify and prioritize vulnerabilities based on sound risk-management principles, ensuring a vulnerability management program that is effective and aligned with broader risk-management goals.
Posted: 27 Jan 2014 | Published: 27 Jan 2014
Get This Now


Endpoint Security IT Decision Center Handbook 3
sponsored by SearchSecurity.com
EGUIDE:Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013
Get This Now


Endpoint Security IT Decision Center Handbook 2
sponsored by SearchSecurity.com
EGUIDE:Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013
Get This Now


Mobile Security Insider's Edition
sponsored by SearchSecurity.com
EZINE:This Insider Edition will lay out the basic strategies your organization should follow when dealing with mobile security, including data protection technologies, mobile device management and policies dealing with employees bringing personal consumer devices onto the network.
Posted: 18 Nov 2013 | Published: 18 Nov 2013
Get This Now


1 - 25 of 99 Matches
Page: 2 3 4 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement