All resources sponsored by:

SearchSecurity.com

1 - 25 of 601 Matches
Mobile security policies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn about applicable security policies that you can implement to neutralize today's biggest Android threats.
Posted: 01 Sep 2015 | Premiered: 19 Aug 2015
Get This Now


Hybrid Cloud Security Is No Castle in the Air
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at hybrid cloud security and five strategies that CIOs have used to secure these environments.
Posted: 01 Sep 2015 | Published: 01 Sep 2015
Get This Now

TOPICS:  Security

What to Look For in a Web Application Scanner
sponsored by SearchSecurity.com
EBOOK:With so many Web applications on enterprise networks today, a scanner is essential to security. Here's what you need to know if you're in the market for a Web app scanner.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
Get This Now


Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK:This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
Get This Now


Realign your data protection efforts
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:David Sherry explains how your organization should react to the shift of organized online criminals from coveting credit card numbers to identity information and how to re-prioritize your efforts in protecting your organization.
Posted: 06 Aug 2015 | Premiered: 20 Jul 2015
Get This Now


The Cyber-Centric Enterprise: Maintaining a Dynamic Security Posture in a Chaotic Threat
sponsored by SearchSecurity.com
VIRTUAL SEMINAR:This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.
Posted: 05 Aug 2015 | Premiered: 28 Jul 2015
Get This Now


Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE:Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015
Get This Now


The Problem with the Padlock
sponsored by SearchSecurity.com
EBOOK:TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
Posted: 16 Jul 2015 | Published: 16 Jul 2015
Get This Now


What to Look for in Email Security Gateways
sponsored by SearchSecurity.com
EBOOK:Email security gateways protect the networks of organizations of all sizes from email-borne threats. But there are a wide variety of these security tools available. How do you know which is best suited for your network?
Posted: 01 Jul 2015 | Published: 01 Jul 2015
Get This Now

TOPICS:  Email Security

Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE:This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015
Get This Now


Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK:EMM products can contain a variety of features -- for mobile device management, mobile app management, mobile content management and more -- so they vary greatly. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015
Get This Now


Is it time for a DLP system in your enterprise?
sponsored by SearchSecurity.com
EBOOK:Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015
Get This Now


Shore Up Your Office 365 Attack Surface
sponsored by SearchSecurity.com
EBOOK:This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015
Get This Now


Virtualization Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at how malware is adapting to virtual networks and tools (advanced malware protection) and processes (hardening, logging, snapshots) that can help organizations secure these environments.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015
Get This Now


Surviving in a State of Denial
sponsored by SearchSecurity.com
EBOOK:DDoS prevention begins with understanding the nature of the latest attacks. Learn what your system is up against when it comes to DDoS and how configuration can help contain them.
Posted: 15 Jun 2015 | Published: 15 Jun 2015
Get This Now


Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015
Get This Now


Information Security Magazine: June Issue
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at malware is adapting to virtual machines and strategies that can help organizations secure these environments.
Posted: 01 Jun 2015 | Published: 01 Jun 2015
Get This Now


Fighting Crimeware
sponsored by SearchSecurity.com
EBOOK:In this e- guide, you'll find resources written by security experts on the workings of crimeware and the best ways to stop it.
Posted: 20 May 2015 | Published: 20 May 2015
Get This Now


Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015
Get This Now


Information Security Magazine – May 2015 Issue
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015
Get This Now


Security School: Identity and Access Management for Modern IT
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:With videos, white papers and more, this interactive online environment can help you design IAM that's effective in today's IT landscape.
Posted: 30 Apr 2015 | Premiered: 29 Apr 2015
Get This Now


Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:In this virtual classroom, you'll find videos, white papers, and expert advice that can help you prepare for the next wave of cybercrime.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015
Get This Now


Emerging SSL threats: New techniques and countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn about specific methods attackers are using to exploit SSL and how to defend against them.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015
Get This Now

TOPICS:  SSL | SSL VPN

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015
Get This Now


Buyer's Essentials: What to look for in User Behavioral Analytics
sponsored by SearchSecurity.com
EBOOK:This guide helps InfoSec pros considering a user behavioral analytics tool purchase. It reviews key features, deployment strategies and reasonable performance expectations.
Posted: 21 May 2015 | Published: 21 May 2015
Get This Now


1 - 25 of 601 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement