IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Reports
 
MAC Spoofing Webinar: Learn to Protect Yourself from Data Breaches
sponsored by Great Bay
WEBCAST: In this webinar, you will learn the top 3 challenges to securing your network from MAC spoofing, a popular way for hackers to attack your data, and how to overcome them.
Posted: 27 Mar 2015 | Premiered: Mar 2, 2015

Great Bay

Rethinking Data Protection for MSPs
sponsored by Datto, Inc.
WHITE PAPER: This white paper examines the magnitude of data protection challenges as well as solutions to mitigate risks for consumers in any environment.
Posted: 27 Mar 2015 | Published: 25 Feb 2015

Datto, Inc.

Alternative Strategies to Mobile Device Security
sponsored by Maas360 by IBM
WEBCAST: This webcast offers an alternative to managing an entire mobile device and keeps enterprise data inside an encrypted container.
Posted: 24 Mar 2015 | Premiered: Jan 21, 2015

Maas360 by IBM

Mitigating the cyber threat from malicious insiders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Advanced Threat Protection
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

Learn what to include in a proactive threat management program
sponsored by Alert Logic
WHITE PAPER: This handy resource gives you the ten steps to successful threat management.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Log Management Solution for IT Big Data
sponsored by TIBCO Software Inc.
WHITE PAPER: Read this white paper to learn about a log management solution for compliance, security, and IT operations management.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TIBCO Software Inc.

Cloud Security through Trend Micro Deep Security
sponsored by Trend Micro
VIDEO: Inside this brief video, learn about a technology that provides organizations with the tools to mitigate security threats built especially for the cloud. Find out how one click can add security to your instances without you having to manage the entire security infrastructure yourself.
Posted: 31 Mar 2015 | Premiered: 18 Dec 2014

Trend Micro

Best Practices for Incident Detection and Response
sponsored by SurfWatch Labs
WEBCAST: This webcast teaches you how to get the most from your threat intelligence by presenting the best practices for incident detection and response.
Posted: 30 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement