IT Management  >   Systems Operations  >   Security  >  

Control Internet Access

RSS Feed    Add to Google    Add to My Yahoo!
Control Internet Access Reports
 
Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Increase E-commerce Conversion Rates with Extended Validation SSl Certificates
sponsored by GeoTrust, Inc.
WHITE PAPER: Learn how deploying an EV certificate on your eCommerce website can protect against threats, while showing your customers that they can transact with confidence, helping increase your sites conversion rates.
Posted: 17 Jul 2015 | Published: 11 Nov 2014

GeoTrust, Inc.

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

September CIO Decisions Ezine: Architecting a Nimble Enterprise
sponsored by SearchCIO.com
EZINE: Agile and lean are the cornerstones of many a successful IT strategy, but what if a CIO works in a sector that hasn't yet embraced the agile enterprise?
Posted: 06 Sep 2013 | Published: 06 Sep 2013

SearchCIO.com

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
sponsored by Dell SonicWALL
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Website Security Threat Report, Part Two
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement