IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Level Threats Reports
 
The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

How Cloud Faxing Protects Confidential Customer Information
sponsored by J2 Cloud Services
RESOURCE: In this resource, recognize the risks associated with traditional faxing and learn how cloud faxing can help prevent big data breaches.
Posted: 13 Sep 2017 | Published: 23 Dec 2016

J2 Cloud Services

Ransomware is on the Rise
sponsored by AdvizeX Technologies
RESOURCE: In this resource by 15-year industry veteran Sam Cattle, uncover a brief history of the rise of ransomware, and learn the 3 ways you can stop this threat.
Posted: 28 Jul 2017 | Published: 13 Dec 2016

AdvizeX Technologies

Bots to the Future – Why Bot Management Solutions are Necessary to Stop Hackers
sponsored by Akamai Technologies
RESEARCH CONTENT: This Frost and Sullivan review seeks to explore the challenges presented by bots, emerging solutions for bot management, and the potential market for these systems.
Posted: 20 Sep 2017 | Published: 31 Dec 2016

Akamai Technologies

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place is all it takes to stave off the panic when an attack hits, and help you return to business as usual. Inside, learn 8 steps you can take to put this plan in place.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Antimalware Protection and the Fundamentals of Endpoint Security
sponsored by OPSWAT inc
EGUIDE: In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement