Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blockers

RSS Feed    Add to Google    Add to My Yahoo!
Ad Blockers Reports
Security Has Failed Us - But it's not Too Late
sponsored by Unisys
VIDEO: Watch this brief video as security solutions expert Tom Patterson explains the failures of the security industry and how they've worsened due to new threats and environments. Tune in and discover the surprising way to overcome these failures.
Posted: 23 Nov 2015 | Premiered: 09 Nov 2015


Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013


Manage and Protect your Business with SaaS-Based Server Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief outlines how to integrate your server and security strategies. Discover how the right combination can bring you enhanced productivity, collaboration, and security.
Posted: 16 Nov 2015 | Published: 29 Nov 2013

Hewlett Packard Enterprise

Leveraging the Right Cloud Solution for Your Toughest Data Challenges
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: In this white paper, learn about new developments in the cloud space, and the factors to consider before setting up a cloud implementation model. Furthermore, learn how to strategize effectively so that you can make an informed choice when selecting a path to cloud adoption.
Posted: 05 Oct 2015 | Published: 30 Jun 2015

Dell, Inc. and IntelĀ®

Infographic: Application Security on Cloud
sponsored by IBM
RESOURCE: This infographic identifies an application security analyzer that can perform periodic security testing, identify high-priority vulnerabilities, and improve your overall application security program. Learn how you can secure your enterprise's application development infrastructure more effectively before applications are deployed.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


How to Avoid the Mobile Software Licensing Cost Trap
sponsored by Matrix42
WHITE PAPER: There is now an urgent requirement for transparency and control over software compliance within companies. This white paper serves as an instructive guide for optimizing your software expenses using mobile asset management, ensuring the efficient use of software.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Secunia Vulnerability Review
sponsored by
RESEARCH CONTENT: The absolute number of IT security vulnerabilities detected in Secunia's 2015 annual vulnerability survey reached 15,435, discovered in 3,870 applications from 500 suppliers.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

Educational 1:1 Computing: Tablet Learning Platforms and MDM
sponsored by MXN Corporation
PRODUCT OVERVIEW: This resource provides you with a brief overview of an enhanced tablet learning platform, one which will enable teachers to create and distribute educational content to students. Read on now to learn how to monitor access to content via secure student tablet deployment.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

MXN Corporation

Tools, Comparisons, and Scenarios for Threat Intelligence Services
sponsored by Cyveillance, Inc.
EGUIDE: This expert guides separates the benefits of threat intelligence from all the sales talk that usually surrounds the product, discussing exactly what it can do and who really needs it.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Cyveillance, Inc.

Network Security Considerations for Private vs. Public Clouds
sponsored by Palo Alto Networks
WHITE PAPER: The purpose of this white paper is to present security-related information which companies should consider when deciding whether to pursue public or private cloud deployment. Compare cloud models against several criteria, including physical and virtual attack surfaces, data migration, incident management, and more.
Posted: 20 Oct 2015 | Published: 31 May 2015

Palo Alto Networks
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement