IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero ThreatsReports
 
The New Mobile Security Agenda
sponsored by Accellion, Inc.
WHITE PAPER: This resource offers key recommendations for enhancing mobile security strategies to avoid business risk and disaster.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
ANALYST REPORT: Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.

Dragonfly: Cyberespionage Attacks Against Energy Suppliers
sponsored by Symantec Corporation
WHITE PAPER: The following security response provides an overview of the tools and tactics used by the attackers and a timeline of their attacks. Read on to inform your company of possible malware threats.
Posted: 09 Jul 2014 | Published: 30 Jun 2014

Symantec Corporation

IPS/IDS: Innovations, Changes and How to Solve Your Problems
sponsored by IBM
EGUIDE: This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach detection issues.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Free Trial: Real-Time Threat Detection and Security Visibility from Day 1
sponsored by AlienVault
SOFTWARE DOWNLOAD: This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Posted: 24 Jul 2014 | Premiered: 24 Jul 2014

AlienVault

Securing virtual desktop infrastructure with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This paper explains how, by integrating an extensive set of network and application-layer protection mechanisms, Citrix® NetScaler® can provide advanced access and action control capabilities, deep visibility for rapid trouble shooting and a wealth of additional service delivery features.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement