IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
 
Outbound Gateway Protection with UTM on AWS
sponsored by AWS - Sophos
CASE STUDY: AWS is popular for the wealth of benefits it offers users, but a vital component of operating on AWS, however, is ensuring data and workloads hosted on AWS are secure. Access this white paper to learn about protecting your AWS environment with unified threat management.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

AWS - Sophos

Easily Connect and Deliver NGFW Services in AWS Multi-VPC Deployments
sponsored by Juniper - AWS
WHITE PAPER: Most organizations want their data centers closer to end users. This white paper discusses the importance of a transit VPC and how it enables you to add next-generation firewall services and connectivity to large multi-VPC AWS deployments.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

Juniper - AWS

Securing the Web: The Plight of the Modern Cybersecurity Team
sponsored by Comstor
WHITE PAPER: Whether they come from network, endpoint, or mobile devices, threats are getting more sophisticated and attack surfaces are getting larger. Discover how your security team can ensure that users get the same protection whether they are working on or off the corporate network using DNS security.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

Comstor

Top 5 IoT Deployment Best Practices
sponsored by Hewlett Packard Enterprise
RESOURCE CENTER: Overcome potential barriers to IoT adoption by uncovering 5 best practices for creating successful IoT deployments with end-to-end network security, automatic app performance optimization, smart monitoring of wired and wireless infrastructure, and more.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

Hewlett Packard Enterprise

Mobile Security Risk Mitigation and Tips for Success
sponsored by Blue Cedar
EGUIDE: Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Ransomware is a very real threat, seemingly in the news everyday with attacks like WannaCry. Learn how to deploy a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Citrix

Waste Less Time Fighting Ransomware
sponsored by Comstor
PODCAST: Don't become another ransomware casualty in their growing number of attacks. Learn the inner working of the modern ransomware threat, as well as how to prevent and contain it from harming your organization.
Posted: 30 Jun 2017 | Premiered: Jun 30, 2017

Comstor

Case Study: Auto Supplier's DNS Security Lowered Alerts, Increased Protection
sponsored by Cisco Umbrella
WHITE PAPER: Learn how a major automotive group was able to preemptively secure their globally distributed network against potential threats, safeguarding 2,500 users and their valuable intellectual property.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Umbrella

4 Major Threats to Mobile Security
sponsored by MobileIron
WHITE PAPER: Learn about 4 top malware threats to mobile security, how they work, what impact they could have on your business if you're infected, and how to detect and mitigate each strain.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

MobileIron

How to Secure IoT, Mobile, and Endpoints
sponsored by IBM
WHITE PAPER: Discover a smarter way to secure and enable endpoints, end users and everything in between.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement