IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats Reports
 
Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 5 vital cloud data protection questions and answers in this white paper, covering your organization's first steps into migrating to the cloud all the way to dealing with long-term compliance issues.
Posted: 22 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

7 Data Loss Prevention Suite Providers Compared
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this report, Forrester Research identified, researched, and analyzed 7 top data loss prevention providers. Learn how each provider measures up and discover how to make an educated decision in choosing which might be the best for your enterprise.
Posted: 02 Feb 2017 | Published: 08 Nov 2016

Symantec & Blue Coat Systems

IDC Analyst Connection: Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Networks have changed drastically since the first firewall was introduced, and as a result, networking pros can no longer assume traffic within the perimeter can be trusted. In this Q&A with IDC's Chris Christiansen, learn how internal segmentation firewalls can help you secure your expanding network.
Posted: 10 Feb 2017 | Published: 31 Jul 2015

Fortinet, Inc.

Sonicwall 2017 Annual Threat Report
sponsored by Dell SonicWALL
WHITE PAPER: The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. Discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape in this expansive threat report.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Dell SonicWALL

Preventing Ransomware: Healthcare CIO Discusses Top Technologies
sponsored by Cisco
EGUIDE: In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.
Posted: 07 Feb 2017 | Published: 02 Feb 2017

Cisco

The Ultimate Guide to Preventing Web Scraping
sponsored by Distil Networks
WHITE PAPER: It is estimated that 46% of all web activity is now down to bots. There are good and bad bots but web scrapers are in a gray area. Discover the issues around web scrapers and what can be done to control their activity.
Posted: 24 Jan 2017 | Published: 30 Dec 2016

Distil Networks

Why Mobile Devices are the Biggest Enterprise Security Threat
sponsored by BlackBerry
WEBCAST: Enterprises are losing the security battle and mobile devices are the biggest threat. In this webcast, learn effective ways to manage risks and mitigate threats associated with mobile devices and how mobile security can enable your business and employees to be more productive.
Posted: 23 Jan 2017 | Premiered: Oct 31, 2016

BlackBerry

App Security: Shore up the Weaknesses in Your WAF
sponsored by tCell
WHITE PAPER: Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses, protecting your web applications and modernizing your security policy to stand firm against today's threats landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

tCell

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

New Strategies For Backup and Disaster Recovery
sponsored by Iron Mountain
EGUIDE: In this expert-eguide, learn steps to keeping your data more secure like focusing on the 3 major techniques used in data backup, how to quickly recover from a ransomware attack, why using a recovery-in-place technique could be beneficial, and more.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement