IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
 
Detect Ransomware Before it’s Too Late
sponsored by AlienVault
WEBCAST: In this webcast, learn how to detect ransomware and protect your network before it's too late.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

Managed, Shared Resources: Public Cloud
sponsored by Dimension Data
WHITE PAPER: In this white paper, discover how one public cloud service in particular remains secure, scalable and convenient, and find out how it can pay off for your business.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Dimension Data

Keep Your Network Secure with Threat Intelligence and SIEM
sponsored by Threatstream
EGUIDE: In this expert e-guide, discover how to integrate threat intelligence with SIEM for optimal network security.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Threatstream

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

SearchSecurity.com

Enabling Mobile Users and Staying Compliant
sponsored by BlackBerry
WHITE PAPER: Healthcare providers find it difficult enable collaboration and efficient workflows while complying with regulations because of the sensitive information on staff's mobile devices. Find out how a containerization, application-wrapping, and secure connectivity option can bring healthcare organizations a higher level of control and security.
Posted: 15 Apr 2015 | Published: 31 Dec 2014

BlackBerry

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

5 Keys to Unlock an Easy Network Access Control Implementation
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll discover the 5 keys to unlocking easier NAC implementation.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

Ward Off Vulnerabilities by Securely Implementing and Configuring SSL
sponsored by GeoTrust, Inc.
EGUIDE: Read this expert E-Guide to learn how to implement and configure SSL's to ward off their vulnerably within your organization.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

GeoTrust, Inc.

Cloud Workloads on the Mainframe
sponsored by IBM
RESOURCE: In this resource, explore how cloud workloads operate on the mainframe and learn about several distinct advantages that it offers.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement