IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Level ThreatsReports
 
Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

Building an Intelligence-Driven Security Operations Center
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Learn why security organizations needs to shift resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach required to do so.
Posted: 22 Oct 2014 | Published: 17 Jun 2014

RSA, The Security Division of EMC

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will teach you how to protect yourself from damaging attacks and effectively respond to them and unveils the protection and defense life cycle.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation

Leverage SIEM technology to Identify and Prevent Unauthorized Network Access
sponsored by AlienVault
EGUIDE: In this expert eGuide, discover how you can leverage SIEM technology in order to detect unauthorized access to your networks and more effectively prevent malicious activities or content from infiltrating your security systems.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

AlienVault

Best Practices for SIEM Advanced Attack Detection
sponsored by AlienVault
EGUIDE: In this expert eGuide, discover the best practices for today's SIEM solutions and how you can maximize their performance and effectiveness in your organization's IT security.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

AlienVault

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Staying Protected Before, During, and After a Cyber Attack
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this informative white paper, discover a threat-centric security strategy that provides superior visibility, continuous control, and advanced threat protection– all while reducing complexity.
Posted: 19 Sep 2014 | Published: 30 Jun 2014

Cisco Systems, Inc.

Weighing Risk Against the Total Cost of a Data Breach: Can You Afford a Web Application Layer Attack?
sponsored by Akamai Technologies
WHITE PAPER: This white paper presents a proven, industry-standard approach to determining a company's risk of web application cyber-attacks. The provided equation can help you justify the cost of proactively deploying cybersecurity products and services to protect against web application attacks, including those that could lead to data breaches.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement