IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Threats Reports
 
Advanced Threat Protection
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

6 Tips for Getting the Most out of Email Security as a Service
sponsored by Mimecast
EGUIDE: This expert e-guide offers six tips to get the most out of your email security solution and how to evaluate email security as a service providers. View now to learn more.
Posted: 10 Mar 2015 | Published: 07 Jan 2015

Mimecast

South Washington Co. Schools: redefining the network
sponsored by Hewlett-Packard Limited
WHITE PAPER: As a result of the exponential growth in wireless devices, South Washington County Schools needed an easier way to maintain security and manage both wired and wireless networks. Read this case study to learn more about the structure the school implemented to improve security.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Hewlett-Packard Limited

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Managed Cloud Environment Security FAQ
sponsored by Dimension Data
WHITE PAPER: Access this white paper to get answers to how security is maintained in multi-tenanted and dynamic environments.  Read on to explore how to evaluate the security of managed cloud environment providers.
Posted: 03 Mar 2015 | Published: 10 Sep 2014

Dimension Data

Are you regularly monitoring log data?
sponsored by Alert Logic
WHITE PAPER: In this quick infographic, you will learn the 13 collections and alerts that help support the infrastructure security of an automated log management system.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

Anamoly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WEBCAST: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Premiered: Jan 24, 2015

Prelert

As cloud adoption grows, securing cloud-based information a concern
sponsored by Alert Logic
WHITE PAPER: Download this white paper to discover what types of threats are growing, how often they attack, and what you can do to better secure your organization.
Posted: 16 Mar 2015 | Published: 31 May 2014

Alert Logic

Self-Assessment: How Prepared Are You for Advanced Attacks?
sponsored by FireEye
WHITE PAPER: Take this brief self-assessment for an estimate on how prepared you are and suggestions on how to improve.
Posted: 01 Apr 2015 | Published: 31 Dec 2014

FireEye

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement