IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Threats Reports
Shadow Data Report: Cloud Apps and Services Adoption, Use, and Threats
sponsored by Symantec + Blue Coat
WHITE PAPER: In this shadow data report, you'll uncover a multilayered data science approach to identifying malicious cloud-related activity. Learn how you can leverage machine learning and computational analysis to detect suspicious user behavior.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat

Your Guide to Business Email Compromise
sponsored by Agari
PRODUCT DEMO: Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.
Posted: 19 Oct 2016 | Premiered: 19 Oct 2016


Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016


It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

Is Your Data Secure?
sponsored by Commvault
INFORMATION CENTER: Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy.
Posted: 18 Oct 2016 | Published: 29 Jul 2016


How to Mitigate Shadow Cloud Services Security Risks
sponsored by IBM
EGUIDE: Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services. Discover a few simple steps to identify shadow cloud apps and protect your data.
Posted: 05 Oct 2016 | Published: 03 Oct 2016


Executive Guide: Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: To safely and effectively adopt 0ffice 365, you must budget and plan for additional security measures and you will probably need to provision up to accommodate higher internet traffic volumes. This executive guide provides key security and provisioning considerations to keep in mind during your move to Office 365.
Posted: 12 Oct 2016 | Published: 31 Aug 2016

Symantec + Blue Coat

What's the Best Way to Handle External Security Auditors?
sponsored by Dell Software
EGUIDE: A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Defining Security for Today’s Cloud Environments
sponsored by Fortinet, Inc.
EBOOK: Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn what to look for when choosing the right hybrid cloud solution you and your enterprise, and why organization needs to augment traditional firewalls and security appliances with expanded protection.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement