IT Management  >   Systems Operations  >   Security  >  

Virus Protection

RSS Feed    Add to Google    Add to My Yahoo!
Virus ProtectionWhite Papers (View All Report Types)
151 - 156 of 156 Matches Previous Page  |  Next Page
Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER: Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007

Dell Software

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Multiple Lines of Defense
sponsored by ENDFORCE, Inc
WHITE PAPER: No single countermeasure can protect your network from every conceivable threat, this white paper examines how to effectively mitigate risk by implementing an integrated multilayered security system for controlling endpoint attacks.
Posted: 05 Apr 2006 | Published: 31 Dec 2005

ENDFORCE, Inc

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

3 Steps for Bullet-proof Wireless LAN Security & Management
sponsored by AirDefense Inc.
WHITE PAPER: As attacks on wireless technologies grow, the need for an effective wireless security plan becomes crucial. This white paper provides best practices on how to deploy secure wireless networks and protect against security threats and policy violations.
Posted: 12 May 2003 | Published: 31 Dec 2005

AirDefense Inc.
151 - 156 of 156 Matches Previous Page    5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement