IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Security ThreatsReports
 
Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This guide explores security automation and how you can ensure system security with 4 main strategies.
Posted: 10 Apr 2014 | Published: 31 Mar 2013

Qualys

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

Balance End User Satisfaction and Business Productivity
sponsored by BlackBerry
WHITE PAPER: This white paper talks about the benefits of corporate owned, personally enabled devices that provide a lot of the same benefits as BYOD, but without the security issues.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

BlackBerry

Channel Edge Reseller Program
sponsored by Webroot
WHITE PAPER: This brief white paper explains why VARs, system integrators, and IT solution providers should sell and support an endpoint security solution from Webroot in order to provide customers with the best security possible.
Posted: 16 Apr 2014 | Published: 30 Aug 2013

Webroot

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Mobile Application Security Chaos
sponsored by Hewlett-Packard Company
WEBCAST: Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.
Posted: 08 Apr 2014 | Premiered: Apr 8, 2014

Hewlett-Packard Company

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

LogRhythm, Inc.

The Big Data Security Analytics Era is Here
sponsored by EMC Corporation
WHITE PAPER: Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Posted: 11 Apr 2014 | Published: 31 Jan 2014

EMC Corporation

Data Security Through the Cloud
sponsored by Cisco Systems, Inc.
RESOURCE: The combination of cloud computing and mobility is often the perfect storm for security threats. Check out this blog post to learn about the threats that could be facing your data stored in the cloud, and how to overcome 2014's top cloud security challenges.
Posted: 03 Apr 2014 | Published: 06 Mar 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement