All resources sponsored by:

SearchSecurity.com

1 - 25 of 588 Matches
Intrusion Detection and Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK:Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 27 May 2015 | Published: 27 May 2015
Get This Now


Intrusion Detection and Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK:To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.
Posted: 27 May 2015 | Published: 27 May 2015
Get This Now


Intrusion Detection and Protection: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK:Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 27 May 2015 | Published: 27 May 2015
Get This Now


Buyer's Essentials: What to look for in User Behavioral Analytics
sponsored by SearchSecurity.com
EBOOK:This guide helps InfoSec pros considering a user behavioral analytics tool purchase. It reviews key features, deployment strategies and reasonable performance expectations.
Posted: 21 May 2015 | Published: 21 May 2015
Get This Now


Fighting Crimeware
sponsored by SearchSecurity.com
EBOOK:Examine crimeware, RAM scraping and advanced evasion techniques to learn how to defend systems, and investigate when defenses fail.
Posted: 20 May 2015 | Published: 20 May 2015
Get This Now


Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015
Get This Now


Information Security Magazine – May 2015 Issue
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015
Get This Now


Identity and Access Management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom covers need-to-know information about identity and access management, including best practices as well as some new tools to help manage your IAM strategy.
Posted: 30 Apr 2015 | Premiered: 29 Apr 2015
Get This Now


Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015
Get This Now


Emerging SSL threats: New techniques and countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn about specific methods attackers are using to exploit SSL and how to defend against them.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015
Get This Now

TOPICS:  SSL | SSL VPN

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015
Get This Now


Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK:To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015
Get This Now


April Information Security - Defending Against the Digital Invasion
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.
Posted: 01 Apr 2015 | Published: 25 Mar 2015
Get This Now


Making Sign-on Simple and Secure
sponsored by SearchSecurity.com
EBOOK:Single sign-on has a complicated history. This technical guide brings you up to date on how the main protocols for single sign-on -- OpenID and Security Assertion Markup Language (SAML) -- compare and how they can be connected to the pieces you already have. While SAML seems to be winning the field, OpenID shouldn't be ruled out.
Posted: 13 Mar 2015 | Published: 13 Mar 2015
Get This Now

TOPICS:  Security | SSO

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE:Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE:Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015
Get This Now


March Information Security – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE:Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015
Get This Now


Web security meets DDoS Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:John Pescatore explores new DDoS attack vectors and discusses incident response planning (tools and processes) you need to plan for in 2015.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015
Get This Now


Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by SearchSecurity.com
EBOOK:As online shopping burgeons, so does credit card fraud. We examine the latest credit card scams, and how technology and standards set by the Payment Card Industry can help.
Posted: 13 Feb 2015 | Published: 13 Feb 2015
Get This Now


Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015
Get This Now


Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 03 Feb 2015 | Premiered: 02 Dec 2014
Get This Now


Security Magazine: Discover the Latest Security Tips
sponsored by SearchSecurity.com
EZINE:Denial-of-service attacks have caused serious disruptions for years. Yet 40% of enterprises remain unprepared to launch a DDoS defense and recover business services.
Posted: 02 Feb 2015 | Published: 30 Jan 2015
Get This Now


Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013
Get This Now


What to look for in secure file transfer
sponsored by SearchSecurity.com
EBOOK:This guide provides essential knowledge for enterprise InfoSec pros acquiring tools and products to transfer files efficiently and securely.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


1 - 25 of 588 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement