All resources sponsored by:

SearchSecurity.com

1 - 25 of 536 Matches
Vulnerability Management Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:How do you win a losing battle—in this case, the battle of vulnerability management? Whether it's Java or Adobe or something you never previously heard of, let's face it: the battle against system vulnerabilities is a losing one.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014
Get This Now


Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK:This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 10 Jul 2014 | Published: 10 Jul 2014
Get This Now


Information Security ASEAN July 2014
sponsored by SearchSecurity.com
EZINE:This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014
Get This Now


Information Security ANZ July 2014
sponsored by SearchSecurity.com
EZINE:This ezine looks at how will new privacy laws impact IT departments in Australia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014
Get This Now


TechTarget's Annual Salary and Careers Survey Results
sponsored by SearchSecurity.com
EBOOK:The results of TechTarget's 2013 IT Salary and Careers Survey chart the compensation, job satisfaction and project priorities of 1,711 IT professionals, including hundreds of senior IT leaders.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
Get This Now

TOPICS:  Careers | Security

TechTarget's 2013 Annual Salary and Careers Infographic
sponsored by SearchSecurity.com
EBOOK:TechTarget's 2013 Annual Salary and Careers Survey polled 1,711 IT professionals on their 2013 compensation, anticipated future earnings and technology priorities in 2014.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
Get This Now

TOPICS:  Careers | Security

Integrating SIEM and Incident Response Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014
Get This Now


Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by SearchSecurity.com
EBOOK:Diversity. Usually it's a good thing, but not with distributed denial-of-service attacks, which are getting more varied and more lethal. Here's what to do about that.
Posted: 14 May 2014 | Published: 15 May 2014
Get This Now


Information Security – May 2014
sponsored by SearchSecurity.com
EZINE:The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014
Get This Now


Information Security Magazine – April 2014
sponsored by SearchSecurity.com
EZINE:In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
Posted: 01 Apr 2014 | Published: 01 Apr 2014
Get This Now


Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE:This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
Get This Now


Technical Guide on Application Security
sponsored by SearchSecurity.com
EZINE:This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Posted: 06 Mar 2014 | Published: 31 Dec 2012
Get This Now


Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE:In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 05 Mar 2014 | Published: 05 Mar 2014
Get This Now


Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014
Get This Now


Unified Threat Management: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK:To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
Get This Now


Unified Threat Management: Decision Time
sponsored by SearchSecurity.com
EBOOK:Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
Get This Now


Unified Threat Management: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK:Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014
Get This Now


Enterprise Mobility Adoption and Security Considerations
sponsored by SearchSecurity.com
EGUIDE:This expert e-guide from searchEnterpriseDesktop.com examines the detailed benefits of increased mobility and addresses the key areas to be considered when it comes to mobile security, particularly laptop usage and practices you can follow to avoid security breaches.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
Get This Now


SIEM Technical Guide
sponsored by SearchSecurity.com
EGUIDE:This TechGuide examines the policies and enhanced monitoring needed from a SIEM to make smarter decisions and respond faster to incidents.
Posted: 19 Feb 2014 | Published: 19 Feb 2014
Get This Now


Security University: Security Analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014
Get This Now


Why You Should Evaluate Software-Defined Networking Now
sponsored by SearchSecurity.com
EBOOK:Sort through the hype around software-defined networking and you could find valuable ways to improve efficiency in the data center—but those improvements may be a few years in the making.
Posted: 04 Feb 2014 | Published: 04 Feb 2014
Get This Now


Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK:FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014
Get This Now


Information Security ASEAN March 2014
sponsored by SearchSecurity.com
EZINE:This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
Get This Now


What’s the Best Focus for MDM Strategy Now?
sponsored by SearchSecurity.com
EBOOK:This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
Posted: 12 Mar 2014 | Published: 12 Mar 2014
Get This Now


Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE:In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 03 Mar 2014 | Published: 05 Mar 2014
Get This Now


1 - 25 of 536 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement