IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
The Anatomy of DDoS Attacks And Best Practices for Preventing Them
sponsored by Arbor Networks
EGUIDE: This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Arbor Networks

User Behavior Analysis in the Cloud
sponsored by Symantec + Blue Coat
WHITE PAPER: Visibility into real-time traffic, the apps users access, and the activity within these apps can help organizations keep risk out of their cloud environments. Learn more about the powerful combination of machine learning and cloud computing.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat

sponsored by Trustwave
ANALYST REPORT: NSS Labs performed an independent test of the Trustwave Secure Web Gateway SWG TS500 v11.6.0.28. This report describes the test results and will help you determine if this secure web gateway tool is right for you.
Posted: 14 Oct 2016 | Published: 30 Sep 2016


How to Mitigate Shadow Cloud Services Security Risks
sponsored by IBM
EGUIDE: Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services. Discover a few simple steps to identify shadow cloud apps and protect your data.
Posted: 05 Oct 2016 | Published: 03 Oct 2016


Managed Security Services Provider – Evaluation Checklist
sponsored by Trustwave
RESOURCE: Evaluate your next MSSP with this simple to use checklist. With it, you'll know important questions ask during the decision process and be able to compare two potential MSSP's against each other quickly and easily.
Posted: 17 Oct 2016 | Published: 30 Sep 2016


Uncovering the True Costs of Enterprise Mobility
sponsored by Wandera
WHITE PAPER: This report explores the essential findings of a TCO analysis in 5 key areas of cost, including hardware, IT resources, security, and 2 more. Access now to find out how to take a more holistic approach to calculating the TCO for enterprise mobility and defending against the associated security risks.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Learn why provisioning identities and access in today's enterprise environment is inefficient, how to overcome the ingrained obstacles in its way, and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Shadow Data Report: Cloud Apps and Services Adoption, Use, and Threats
sponsored by Symantec + Blue Coat
WHITE PAPER: In this shadow data report, you'll uncover a multilayered data science approach to identifying malicious cloud-related activity. Learn how you can leverage machine learning and computational analysis to detect suspicious user behavior.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat

Put Endpoint Security in Capable Hands
sponsored by
EBOOK: Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement