IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
 
On the Radar: Bayshore Networks Protects the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: This Ovum report details how to get the network security you need to combat the dangers the Industrial Internet of Things presents.
Posted: 24 May 2017 | Published: 22 Feb 2016

Bayshore Networks

When It Comes to Cloud Security, What You Don't Know Can Hurt You
sponsored by evident.io
WHITE PAPER: Access this resource now to learn how to secure your cloud services and get a big-picture view across all of your cloud environments, lower costs, and more.
Posted: 18 May 2017 | Published: 18 May 2017

evident.io

Splunk Everywhere! Ransomware
sponsored by Splunk
WEBCAST: Learn how you can compete with the rising threat of ransomware in this webcast, by using a real-time analytics-based program which allows your security to be adaptive and respond to ransomware attacks at machine speed.
Posted: 23 May 2017 | Premiered: May 23, 2017

Splunk

4 Steps to Bolstering Public Cloud Security
sponsored by evident.io
RESOURCE: Discover a modern, cloud-native security approach that will bolster your public cloud's security with automation, real-time discovery, deep insights and robust reporting.
Posted: 24 May 2017 | Published: 24 May 2017

evident.io

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores how to execute a safe and successful cloud migration. Uncover 6 key security considerations when moving enterprise data and apps to the cloud.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Analyzing Ransomware and Potential Mitigation Strategies
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover how to apply a greylist approach to your ransomware prevention strategy, as well as 5 other recommendations.
Posted: 25 May 2017 | Published: 25 May 2017

CyberArk Software, Inc

5 Actions for Improving Operational Technology Security in the Data Center
sponsored by Bayshore Networks
WHITE PAPER: Uncover 5 actionable recommendations that you can start following today to improve data center operational technology (OT) security.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

How to Secure Office 365 from Advanced Attacks
sponsored by Microsoft
EGUIDE: This e-guide details how to protect Office 365 from phishing attempts, defend end users from malicious sites, and more.
Posted: 12 May 2017 | Published: 12 May 2017

Microsoft

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black

What to Know About SIEM as a Service Before Deployment
sponsored by Splunk
EGUIDE: Access this expert e-guide to learn what would justify a product carrying the "SIEM as a service" label and what characteristics they bear that have contributed to the rising interest in them over the last few years.
Posted: 11 May 2017 | Published: 09 May 2017

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement