IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security ThreatsReports
 
Channel Edge Reseller Program
sponsored by Webroot
WHITE PAPER: This brief white paper explains why VARs, system integrators, and IT solution providers should sell and support an endpoint security solution from Webroot in order to provide customers with the best security possible.
Posted: 16 Apr 2014 | Published: 30 Aug 2013

Webroot

Measure Risks and Vulnerability Effectively
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals.
Posted: 16 Apr 2014 | Published: 31 May 2013

Hewlett-Packard Limited

Third Party Applications: A Chink in Your Armour
sponsored by Lumension
WEBCAST: This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Posted: 15 Apr 2014 | Premiered: Apr 15, 2014

Lumension

NSS Labs: Breach Detection System Comparative Analysis
sponsored by Sourcefire
WHITE PAPER: This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Sourcefire

Ensuring Security for your E-Mail Applications
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative article explores a top-tier email security strategy and how it utilizes advanced malware protection to prevent devastating security breaches.
Posted: 22 Apr 2014 | Published: 27 Feb 2014

Cisco Systems, Inc.

Sharing Sensitive Corporate Documents without Compromising Security and Governance
sponsored by IntraLinks, Inc
WHITE PAPER: This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
Posted: 21 Apr 2014 | Published: 21 Apr 2013

IntraLinks, Inc

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: This paper introduces 10 of the most important vulnerability management, organized across the four key steps in the vulnerability management lifecycle.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Qualys

LogRhythm’s Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide explores one company's top-tier security intelligence platform and the essential security tools it provides.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

LogRhythm, Inc.

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your assets accessible by the Web with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement