IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
 
The GDPR Compliance Checklist
sponsored by Citrix
RESOURCE: The General Data Protection Regulation (GDPR) will be effective on May 25, 2018. Download this checklist to see what your organisation needs to do to stay ahead of the GDPR.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Citrix

A New Way to Look at AWS Security
sponsored by AWS-Cisco
WHITE PAPER: AWS environments that make use of AWS-native services and entity modeling can be protected from known and unknown security threats in a scalable and cost-effective manner. Access this white paper to learn how entity modeling provides a new approach to AWS that ensures security.
Posted: 06 Nov 2017 | Published: 29 Sep 2017

AWS-Cisco

Inside Online Carding Courses Designed for Cybercriminals
sponsored by Digital Shadows
WHITE PAPER: Experts project a loss of $24 billion to payment card fraud by the end of 2018. This paper looks at an online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and protect themselves from becoming the next fraud victim.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

CW ASEAN – November 2017: How managed security services help to reduce cyber risk
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

ComputerWeekly.com

EternalBlue – Everything there is to know
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside this asset to learn everything you've ever wanted to know about the EternalBlue vulnerability. From its mysterious background, the 3 bugs it uses, and even the code it runs on.
Posted: 24 Oct 2017 | Published: 29 Sep 2017

Check Point Software Technologies Ltd.

Bots Mean Business
sponsored by F5 Networks
WHITE PAPER: As bot technology, machine learning, and AI continue to evolve, so will the cyber threats they pose. This paper explores how bot innovation enables cybercrime and how you can optimize business intelligence while protecting your enterprise.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Securing Operational Technology in the Pharmaceutical and Chemical Manufacturing Industries
sponsored by Bayshore Networks
WHITE PAPER: In this white paper, gain a stronger understanding of the cyber security implications of IoT devices in pharmaceutical and chemical manufacturing. Uncover 4 key considerations for protecting against cyber threats when leveraging the IIoT.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Bayshore Networks

What is the Best Type of DDoS Protection for my Business?
sponsored by Arbor Networks
WHITE PAPER: Cisco predicts that by 2020, 17 million DDoS attacks will occur annually. In this white paper, learn which type of DDoS protection is best for your business.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arbor Networks

Absolute Persistence
sponsored by Absolute
WHITE PAPER: Technology never waits, and in the past 20 years we've seen plenty of change. Gone are the days when IT could support the business with one make of PC and a phone. Explore this white paper to discover how to secure and manage endpoints so your organization is protected, business data is secured, and end user productivity is supported.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Absolute
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement