IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Threats Reports
 
E-Book : Network security guide "Advanced Evasion Techniques for Dummies"
sponsored by Forcepoint
EBOOK: Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Forcepoint

Critical Security and Compliance Considerations for Hybrid Cloud Deployments
sponsored by Hewlett Packard Enterprise
ANALYST REPORT: Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.
Posted: 27 Sep 2016 | Published: 31 Jul 2016

Hewlett Packard Enterprise

Understanding Shared Responsibility for Microsoft Azure
sponsored by Alert Logic
WHITE PAPER: Discover your enterprise's relationship with Azure for IaaS, PaaS, and both Microsoft's and Azure's Active directories. Also learn 7 Azure best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn not only why ransomware is one of the favored tools of the cybercriminal, but also how enterprises fall prey to it, how it attacks their systems, and how to prevent it. Also learn common pitfalls when preparing to combat this threat, and four countermeasures to keep your data safe.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

TrendMicro

The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
WHITE PAPER: Learn what IT pros are saying about Microsoft Azure and how it handles identity and access management, network security, data protection, and more. Discover how to gain insight on how your existing environment maps to potential public cloud offerings.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Softchoice Corporation

Customize Email Security in a Private Cloud
sponsored by Intermedia
WHITE PAPER: Learn what managed public cloud, private cloud and hybrid cloud models can do for your organization's email security – as well as the criteria for choosing the one that's right for you. Access now to specifically uncover the benefits of a Dedicated Hosted Exchange.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Intermedia

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection
sponsored by Code42
WHITE PAPER: With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42

Simple Steps to Evolving Your Website Security in 2016
sponsored by Symantec
WHITE PAPER: Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

The Enterprise Network Firewall Market
sponsored by Fortinet, Inc.
ANALYST REPORT: Discover how NGFWs have added new features, what roles they play in network security functions today, and what place they have in future security developments. Also learn the strengths of specific NGFWs, as well as cautions for their use.
Posted: 19 Sep 2016 | Published: 25 May 2016

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement