IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Threat Management White Papers (View All Report Types)
Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER: Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012


Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011


Securing the Virtual World
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: With the growing need to reduce costs and improve efficiencies and availability of IT resources, organizations have increasingly turned to virtualization. But there are questions around the security within these environments. This paper explores the new security challenges of virtualization and how to overcome them with a layered security approach.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

WatchGuard Technologies, Inc.

A Practical Guide for Beginning the Migration to IPv6
sponsored by Fortinet, Inc.
WHITE PAPER: As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Radware Security Incidents Report, 1H2011 Special Focus: Multi-Layer Attack Threats
sponsored by Radware
WHITE PAPER: This Security Incidents Report explores select cases of recent multi-layered attack threats. Read now to explore these “war stories” and gain key recommendations on how to address them.
Posted: 10 Oct 2011 | Published: 10 Oct 2011


WebPulse Collaborative Defense
sponsored by BlueCoat
WHITE PAPER: Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.
Posted: 04 Nov 2011 | Published: 04 Nov 2011


The Essential Elements of Comprehensive Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: Establishing a comprehensive endpoint security solution is a complicated undertaking. This paper will clarify the various aspects of the endpoint security problem and identify the functional requirements of a comprehensive endpoint security solution.
Posted: 27 Mar 2006 | Published: 01 Feb 2006

Symantec Corporation

Attack Mitigation System
sponsored by Radware
WHITE PAPER: Radware’s Attack Mitigation System (AMS) is a real-time network and application attack mitigation solution that protects the application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, information theft, web service attacks and web defacement. View now to learn more.
Posted: 10 Oct 2011 | Published: 10 Oct 2011


Should You Install Messaging Security Software on Your Exchange Server?
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the pros and cons of installing third-party software on the Exchange Server, and information on Sunbelt Software's Ninja Email Security.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement