IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Level ThreatsReports
 
Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

DDoS Prevention: Time for "Defense in Depth"
sponsored by Fortinet, Inc.
ANALYST REPORT: This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Fortinet, Inc.

The 5 Key Tactics for Dealing with Advanced Persistent Threats
sponsored by Lumension
WHITE PAPER: This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Lumension

2013 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

Your Money or Your Life
sponsored by Webroot
WHITE PAPER: This whitepaper highlights a dangerous new form of malware called CrytoLocker, which holds personal information at ransom. The paper also explains to VARS, IT resellers, and system integrators how Webroot SecureAnywhere can help client IT departments protect against this threat.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Webroot

Mobile Threat Report 2014
sponsored by Webroot
WHITE PAPER: The Webroot® Mobile Threat Report provides an overview of the risks and trends of the mobile space, based on research and analysis conducted by the Webroot Mobile Threat Research team.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Webroot

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper lists 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches.
Posted: 16 Apr 2014 | Published: 30 Dec 2011

Qualys

Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus
sponsored by Lumension
WHITE PAPER: Malware is the most common type of cyber-threat and businesses are struggling when it comes to stopping its growing complexity. This informative resource explores some strategies for preventing these sophisticated malware attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Lumension

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement