IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk Reports
 
Best Practices for Ransomware Detection and Remediation
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard
sponsored by IBM
WEBCAST: This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.
Posted: 16 Nov 2016 | Premiered: Feb 3, 2016

IBM

8 Tips to Stay Ahead of the Top 2016 Data Protection Trends
sponsored by HDS and Veritas
WHITE PAPER: Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: This step-by-step guide will help you implement an advanced application security program for your organization. Be ahead of the curve by knowing the answer to these questions before meeting with high ranking decision makers.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Optimal Security for your Software-Defined Data Center
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual and physical infrastructures face the same security threats - cybercriminals make no distinctions. This means you cannot afford to compromise on security for your virtual environment. Learn about a security tool designed for virtualization platform technologies that barely impacts performance.
Posted: 25 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

IoT Guardian for the Healthcare Industry
sponsored by Zingbox
WHITE PAPER: Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Zingbox

Mitigating Security Risk from Partners, Affiliates and Suppliers
sponsored by Dell SecureWorks
WHITE PAPER: Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Intelligence Reporting: Answers to Your Security Questions
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: This product overview highlights an advanced security intelligence reporting service that can provide answers to your crucial security questions. Learn how this service can reduce damage caused by advanced attacks by accessing now.
Posted: 25 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Secure Your Connected Medical Devices
sponsored by Zingbox
WHITE PAPER: Unprotected medical devices are the top security vulnerability for the healthcare industry. Access this fact sheet to discover how to protect your medical IT network and ensure operational continuity and reliability of all your connected medical devices.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Zingbox

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement