IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security ThreatsReports
 
Endpoint Data Management: Protecting the Perimeter of the Internet of Things
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

LogRhythm, Inc.

LogRhythm’s Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide explores one company's top-tier security intelligence platform and the essential security tools it provides.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

LogRhythm, Inc.

Addressing the Malware Challenge: Strategies At Work
sponsored by Sourcefire
WHITE PAPER: This guide explores the current threat landscape, and what businesses are doing to prevent advanced malware from breaching their system.
Posted: 07 Apr 2014 | Published: 31 Dec 2013

Sourcefire

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER: Access this resource to discover the benefits of cloud-based security, especially for small and medium-sized businesses (SMBs) who have fewer resources when mitigating increasing risks and compliance mandates.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Qualys

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your assets accessible by the Web with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool
sponsored by EMC Corporation
PRODUCT OVERVIEW: Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

EMC Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement