IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Threats Reports
 
Unified Insights on One Unified Threat Management Market Product
sponsored by WatchGuard Technologies, Inc.
EGUIDE: This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.
Posted: 16 Jan 2017 | Published: 13 Jan 2017

WatchGuard Technologies, Inc.

Navigating Market Complexity to Fulfill Network Security Requirements
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester learn how to use a combination of people and tools to deliver secure apps. Gain key takeaways such as mitigation costs skyrocket when security issues survive the development process, watching the OWASP Top 10 doesn't help when your app was attacked with No. 11, and more.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Endpoint Security for the Empowered Enterprise
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This resource examines endpoint protection features that improve system performance and user productivity. Uncover Dell's Endpoint Security Suite Enterprise, how it supports encryption and advanced authentication, and the technical specifications required.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

Wireless Security: Keeping Intrusion Prevention Systems Simple and Effective
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to avoid wrongful classification of devices on your network, keep your wireless secure, and eliminate false alarms and the effort of defining complex rules to identify rogue wireless devices and manually inspecting them.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

Data Breaches: Is Prevention Practical?
sponsored by Palo Alto Networks
RESEARCH CONTENT: Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.
Posted: 19 Dec 2016 | Published: 30 Sep 2016

Palo Alto Networks

Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

The 5 Next Big Things in Mobile Security
sponsored by vmware airwatch
WHITE PAPER: Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. This whitepaper covers the five next big trends in mobile security.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

Optimize Your SIEM Operations
sponsored by Intel Security
RESOURCE CENTER: Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement