IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Microsoft Windows Security

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft Windows Security Reports
 
The New Windows Security- Achieving PC Lockdown without User Backlash
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Organizations need to give users the tools and flexibility they need to do their jobs while avoiding the security, compliance and other risks that local administrative rights introduce. By implementing the best practices outlined in this paper, enterprises can maximize user productivity while maintaining centralized control over security policies.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Dell, Inc. and Intel®

Audits, Compliance and Security: IT Pros share their experience
sponsored by Dell Software
WHITE PAPER: This helpful white paper introduces a way to audit changes quickly and easily from a centralized console.
Posted: 16 May 2014 | Published: 16 May 2014

Dell Software

Minimizing Risks Migrating Away from Windows Server 2003
sponsored by Dell and Microsoft
WHITE PAPER: Access this featured resource to examine one industry leader's migration services. Read on now to learn how you can avoid higher costs and fees and how to accelerate your migration away from WS 2003.
Posted: 02 Jan 2015 | Published: 16 Jul 2014

Dell and Microsoft

Information Security Magazine: May 2010 - Data: Do you know where it’s going?
sponsored by Information Security Magazine
EZINE: This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
Posted: 03 May 2010 | Published: 03 May 2010

Information Security Magazine

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by SearchSecurity.com
EBOOK: Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

SearchSecurity.com

How to Perform Network-wide Security Event Log Monitoring
sponsored by GFI Software
PRODUCT LITERATURE: This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LANguard S.E.L.M.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
Posted: 07 Nov 2011 | Published: 04 Nov 2011

ComputerWeekly.com

Elektroskandia Achieves 65% Annual Savings by Moving To a Modern, Cost-Effective Windows Environment
sponsored by Micro Focus, Ltd
CASE STUDY: Read this case study to learn how Elektroskandia Achieves 65% Annual Savings by Moving To a Modern, Cost-Effective Windows Environment.
Posted: 22 Jul 2010 | Published: 22 Jul 2010

Micro Focus, Ltd

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement