IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Threats Reports
Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

A Report on the Critical Capabilities Required for High-Security Mobility Management
sponsored by Good Technology
ANALYST REPORT: In this exclusive analyst report, you will learn how to achieve increased protection in mobile markets using a hybrid mix of enterprise mobility management (EMM), platform and security vendors. Read on to ensure your EMM vendor will support business processes without disruptions.
Posted: 23 Nov 2015 | Published: 29 Jul 2015

Good Technology

October 2015: DDoS Attacks & Protection Report: North America & EMEA
sponsored by Neustar┬«
WHITE PAPER: This white paper examines DDoS attacks within the last 6 months and reveals key information to learn how to protect your network against determined cybercriminals. View now to learn why you should worry more about low-and-slow attacks rather than a tidal wave DDoS attack.
Posted: 12 Oct 2015 | Published: 29 Sep 2015


The Global Cost of Cyber Crime
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.
Posted: 20 Nov 2015 | Published: 31 Oct 2015

Hewlett Packard Enterprise

Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure
sponsored by Centrify Corporation
WEBCAST: Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications? In this webcast, guest speaker IDC analyst Peter Linstrom will explore these needs as well as trends in how the marketplace is addressing these challenges.
Posted: 05 Nov 2015 | Premiered: Apr 2, 2015

Centrify Corporation

It's Not You, It's Me: Understand the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Review the top 3 threats to public cloud environments in order to craft your security strategy to mitigate malware. Explore the shared security responsibility model to learn what steps you need to take to avoid falling victim to data breaches.
Posted: 26 Oct 2015 | Published: 11 Feb 2015

Alert Logic

Targeted Attack Protection: Bolstering Your Mobile Defenses
sponsored by Proofpoint, Inc.
WEBCAST: In this informative webcast, learn the top 6 malware apps users will encounter, how to secure Apple and Android devices, and mitigate malicious apps. Discover the top mobile app malware threats plaguing organizations and how to thwart them in their tracks before data leakage occurs.
Posted: 30 Oct 2015 | Premiered: Oct 7, 2015

Proofpoint, Inc.

Network Security and Regulatory Compliance Strategies
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this analyst report to find a four-step approach to focused, disciplined network security and sustaining requirements for regulatory compliance.
Posted: 06 Nov 2015 | Published: 06 Nov 2015

Hewlett Packard Enterprise

Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015

Check Point Software Technologies Ltd.

Three Mobile Security Threats IT Should Know
sponsored by CloudMine
EGUIDE: Access this expert e-guide to get a detailed look at three mobile security threats and find out how to safeguard corporate-provided or employee-owned mobile devices in your enterprise. You'll also discover how mobile backend as a service (MBaaS) helps IT shops to bridge the gap between legacy systems and mobile devices.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement