IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
Sluggish Incident Response Report:: Next-Gen Security Problems and Solutions
sponsored by FireEye
WHITE PAPER: Identify the issues plaguing network incident response processes and combat shortcomings like limited human resources. Access this report now to glean an overview of the outside security services that your organization can procure to eliminate sluggish incident response.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Breach Detection Systems Comparative Report
sponsored by Trend Micro
WHITE PAPER: This white paper presents the results of a comparative security test between the top breach detection systems to aid you when crafting your network security strategy.
Posted: 28 Sep 2015 | Published: 02 Sep 2015

Trend Micro

Cloud Security: Revealing Shadow Data
sponsored by Elastica
WEBCAST: This webcast presents how Shadow Data creates countless vulnerabilities in your cloud security strategy.
Posted: 08 Sep 2015 | Premiered: Aug 19, 2015


Secure, Single-tap Access to NFC Mobile Devices
sponsored by HID
WHITE PAPER: In this brief infographic, discover how to secure mobile devices using NFC and mitigate mobile threats. View now to learn how to improve UX without sacrificing data protection.
Posted: 08 Oct 2015 | Published: 31 Aug 2015


Using Big Data for Data Security
sponsored by Splunk
WEBCAST: This webcast demonstrates how to accurately determine the threat activity your organization faces.
Posted: 02 Sep 2015 | Premiered: Jan 16, 2014


Next Generation Threat Defense: Malware Breaks Past Perimeters
sponsored by Trend Micro
WEBCAST: In this thrilling webcast, watch the drama unfold as one organization relies too heavily on fossil network security measures and falls victim to a data breach despite taking all of the necessary remediation steps such as log audits and sandboxing. View now to learn the strategies to bolster network security and how to rethink your architecture.
Posted: 01 Oct 2015 | Premiered: Sep 2, 2015

Trend Micro

The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
ESSENTIAL GUIDE: Access this essential guide to examine the security issues relating to Microsoft Azure and details Azures strengths in those areas.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Softchoice Corporation

Preparing for the Next Attack: Evaluate Your Network Security with Incident Response
sponsored by FireEye
WHITE PAPER: This guide will help you evolve your ability to respond to critical security incidents. Access this paper to uncover the 6 core capabilities to keep in mind as you plan and maintain your network security response plan.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Using Your Existing Technology to Hunt for Cyber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper discusses how you can make your security team ready to make the most of security analytics, even before you purchase any new software.
Posted: 04 Sep 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Infrastructure Monitoring with Speed at Scale
sponsored by SevOne
VIDEO: This short video shows how denial of service attacks can be detected, identified and analyzed.
Posted: 17 Sep 2015 | Premiered: 17 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement