IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Level ThreatsReports
 
The Big Data Security Analytics Era is Here
sponsored by EMC Corporation
WHITE PAPER: Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Posted: 11 Apr 2014 | Published: 31 Jan 2014

EMC Corporation

Measure Risks and Vulnerability Effectively
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals.
Posted: 16 Apr 2014 | Published: 31 May 2013

Hewlett-Packard Limited

Mobile Innovation: Transforming Customer Expectations
sponsored by Cisco Systems, Inc.
ASSESSMENT TOOL: This assessment tool provides you with 6 key factors for your mobile strategy that will increase savings and productivity.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Cisco Systems, Inc.

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by EMC Corporation
WHITE PAPER: Access this informative, in-depth white paper and discover why financial institutions and merchants are the most common targets for cyber-attacks, and what steps these businesses can take to protect themselves against attacks.
Posted: 04 Apr 2014 | Published: 31 Oct 2013

EMC Corporation

Stopping Malicious Botnets
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 11 Apr 2014 | Published: 30 Nov 2012

Hewlett-Packard Limited

NSS Labs: Breach Detection System Comparative Analysis
sponsored by Sourcefire
WHITE PAPER: This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Sourcefire

Beyond the Hype: Real-world APT Solution Testing by NSS Labs
sponsored by Fortinet, Inc.
WHITE PAPER: This resource provides a thorough analysis of the Fortinet FortiSandbox 3000D v1.2 breach detection system. It looks at aspects like the effectiveness, performance and TCO of the solution and finds it to be an effective way to detect breaches and breach attempts.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Fortinet, Inc.

Addressing the Malware Challenge: Strategies At Work
sponsored by Sourcefire
WHITE PAPER: This guide explores the current threat landscape, and what businesses are doing to prevent advanced malware from breaching their system.
Posted: 07 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement