All resources sponsored by:

SearchSecurity.com

1 - 25 of 594 Matches
What to Look for in Email Security Gateways
sponsored by SearchSecurity.com
EBOOK:Email security gateways protect the networks of organizations of all sizes from email-borne threats. But there are a wide variety of these security tools available. How do you know which is best suited for your network?
Posted: 01 Jul 2015 | Published: 01 Jul 2015
Get This Now

TOPICS:  Email Security

Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE:Advanced security monitoring tools scrub collected data -- lots of it -- to add a level of protection not before possible. Learn how they work, and which tools you need.
Posted: 01 Jul 2015 | Published: 01 Jul 2015
Get This Now


What to Look for in Enterprise Mobility Management
sponsored by SearchSecurity.com
EBOOK:EMM products can contain a variety of features -- for mobile device management, mobile app management, mobile content management and more -- so they vary greatly. This guide reviews capabilities and features you'll want to consider before you buy.
Posted: 26 Jun 2015 | Published: 26 Jun 2015
Get This Now


Is it time for a DLP system in your enterprise?
sponsored by SearchSecurity.com
EBOOK:Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015
Get This Now


Shore Up Your Office365 Attack Surface
sponsored by SearchSecurity.com
EBOOK:This exclusive e-guide reviews the Microsoft Office 365 suite including the security benefits and challenges you will encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015
Get This Now


Virtualization Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at how malware is adapting to virtual networks and tools (advanced malware protection) and processes (hardening, logging, snapshots) that can help organizations secure these environments.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015
Get This Now


Surviving in a State of Denial
sponsored by SearchSecurity.com
EBOOK:DDoS prevention begins with understanding the nature of the latest attacks. Learn what your system is up against when it comes to DDoS and how configuration can help contain them.
Posted: 15 Jun 2015 | Published: 15 Jun 2015
Get This Now


Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015
Get This Now


Information Security Magazine: June Issue
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at malware is adapting to virtual machines and strategies that can help organizations secure these environments.
Posted: 01 Jun 2015 | Published: 01 Jun 2015
Get This Now


Buyer's Essentials: What to look for in User Behavioral Analytics
sponsored by SearchSecurity.com
EBOOK:This guide helps InfoSec pros considering a user behavioral analytics tool purchase. It reviews key features, deployment strategies and reasonable performance expectations.
Posted: 21 May 2015 | Published: 21 May 2015
Get This Now


Fighting Crimeware
sponsored by SearchSecurity.com
EBOOK:Examine crimeware, RAM scraping and advanced evasion techniques to learn how to defend systems, and investigate when defenses fail.
Posted: 20 May 2015 | Published: 20 May 2015
Get This Now


Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015
Get This Now


Information Security Magazine – May 2015 Issue
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015
Get This Now


Identity and Access Management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom covers need-to-know information about identity and access management, including best practices as well as some new tools to help manage your IAM strategy.
Posted: 30 Apr 2015 | Premiered: 29 Apr 2015
Get This Now


Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015
Get This Now


Emerging SSL threats: New techniques and countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn about specific methods attackers are using to exploit SSL and how to defend against them.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015
Get This Now

TOPICS:  SSL | SSL VPN

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015
Get This Now


Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK:To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015
Get This Now


April Information Security - Defending Against the Digital Invasion
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.
Posted: 01 Apr 2015 | Published: 25 Mar 2015
Get This Now


SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015
Get This Now


Information Security Magazine – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE:Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015
Get This Now


Web security meets DDoS Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:John Pescatore explores new DDoS attack vectors and discusses incident response planning (tools and processes) you need to plan for in 2015.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015
Get This Now


What to look for in secure file transfer
sponsored by SearchSecurity.com
EBOOK:This guide provides essential knowledge for enterprise InfoSec pros acquiring tools and products to transfer files efficiently and securely.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE:Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE:Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


1 - 25 of 594 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement