IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Reports
 
Wireless Security Survey
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Stop Malware Before It Stops You
sponsored by Trustwave
WHITE PAPER: Discover how to detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.
Posted: 18 Oct 2016 | Published: 31 Dec 2013

Trustwave

A Step-By-Step Guide to Improving Application Insight
sponsored by Splunk
RESOURCE: In this getting started guide, discover how you can use Splunk software to better manage your enterprise's apps to ensure uninterrupted uptime, smooth out hiccups in performance, and more. Learn what causes these issues, common solutions, and more advanced approaches that can save your organization time, money, and effort.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Splunk

Seven Signs You Need to Embrace Desktop and Application Virtualization Now
sponsored by VMware
WHITE PAPER: Do you feel you are spending too much time on device, image, and application maintenance with little time left to focus on strategic IT projects? Download this trend brief to examine the 7 signs that will determine whether or not the time is right for your organization to embrace desktop and app virtualization.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

VMware

3 Ways to Migrate SAP to Microsoft Azure
sponsored by Freudenberg IT
WHITE PAPER: Business agility, innovation, cost reductions, scalability, and shadow IT: These 5 critical areas can be largely impacted and improved upon by leveraging cloud services and SaaS. Explore 3 ways to bring these benefits to SAP management by hosting mission-critical SAP apps in the cloud with Microsoft Azure.
Posted: 09 Dec 2016 | Published: 31 May 2016

Freudenberg IT

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

TechTarget's Top 6 Security Measures for the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

Buff Up Your Web Apps
sponsored by SearchSecurity.com
EZINE: Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

SearchSecurity.com

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement