IT Management  >   Systems Operations  >   Security  >   Security Management  >  

ITM

RSS Feed    Add to Google    Add to My Yahoo!
ITM White Papers (View All Report Types)
 
Should You Install Messaging Security Software on Your Exchange Server?
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the pros and cons of installing third-party software on the Exchange Server, and information on Sunbelt Software's Ninja Email Security.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

A Practical Guide for Beginning the Migration to IPv6
sponsored by Fortinet, Inc.
WHITE PAPER: As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Top 10 Threats to SME Data Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: For a no-nonsense perspective on the most common types of network and data compromises in small to medium-sized businesses, read this white paper. It lists the ten most common vectors of data compromise, with practical techniques and defenses to counter them.
Posted: 26 Oct 2009 | Published: 26 Oct 2008

WatchGuard Technologies, Inc.

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

6 Tips for Choosing a UTM Solution
sponsored by Astaro
WHITE PAPER: Organizations today are replacing multiple, outdated and costly security appliances with a more simplified, single unified threat management (UTM) solution. Which one is best for your business? In this paper, gain key advice on how to choose a comprehensive UTM solution.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Astaro

Attack Mitigation System
sponsored by Radware
WHITE PAPER: Radware’s Attack Mitigation System (AMS) is a real-time network and application attack mitigation solution that protects the application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, information theft, web service attacks and web defacement. View now to learn more.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 07 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation UK Ltd

Botnets: The dark side of cloud computing
sponsored by Astaro
WHITE PAPER: Botnets pose a serious threat to your network and business, rivaling the power today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. View this paper to explore how to protrect against the risk of botnets with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

Astaro

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ITM White Papers | ITM Multimedia | ITM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement