IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Managers Reports
Understanding And Mitigating DDoS Attacks
sponsored by Dyn
EBOOK: This white paper reviews DNS Denial of Service attack concepts and mitigation strategies. Inside, you'll learn common types of DDoS attacks, best practices to protect your DNS infrastructure against DDos attacks, and more.
Posted: 29 Sep 2016 | Published: 29 Sep 2016


Cyber Ransom Survival Guide
sponsored by Radware
WHITE PAPER: The following resource offers a concise overview of ransomware -- including the current threat landscape, who's likely to be targeted, and the marketplace and tools fueling the trend. Access now and you'll also learn about questions you need to ask and next steps you need to take to safeguard your organization.
Posted: 09 Sep 2016 | Published: 09 Sep 2016


Move Your Email to the Cloud with Confidence
sponsored by Mimecast
WHITE PAPER: As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.
Posted: 24 May 2016 | Published: 24 May 2016


Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Check Point Software Technologies Ltd.

Focus: IT Security in the Middle East
sponsored by
EGUIDE: In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016


Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Juniper Networks, Inc.

The Application Delivery Controller: Top 10 Checklist
sponsored by A10 Networks
WHITE PAPER: Access this checklist to uncover 10 capabilities that will allow you to take advantage of secured applications across the enterprise.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

A10 Networks

The IT Security Manager's Guide to Incident Response & Shadow IT
sponsored by OpenDNS
EGUIDE: This expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.
Posted: 02 Mar 2016 | Published: 26 Feb 2016


EMA Research Report: Data-Driven Security Reloaded
sponsored by Prelert
RESEARCH CONTENT: This report is a summary of the results of the DDSR research survey and offers insight into the thinking of 200 IT professionals who support IT security.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement