IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
IT Pros Share Their Experiences Combating Printer Security Threats
sponsored by HP Limited
WHITE PAPER: This white paper outlines the potential security threats posed by printer networks and what you can do to stop them. Learn how companies in three different industries were able to secure their printers, as well as printer security tips that can help you protect your network.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

HP Limited

Managing Business Risk with Assurance Report Cards
sponsored by Tenable Network Security
WHITE PAPER: This whitepaper explains how you can implement a security product that provides assurance Report Cards and enables security leaders to continuously demonstrate security availability.
Posted: 28 Dec 2015 | Published: 28 Dec 2015

Tenable Network Security

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Combating the Insider Threat: Your Guide to Staying Secure
sponsored by Lancope
WHITE PAPER: This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Detect and Thwart Insider Threats
sponsored by Lancope
WHITE PAPER: This white paper discusses how you can stop insider threats with enhanced network visibility. Read on to learn how to keep your organization secure from the inside out.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Bridge the Gap with SDN
sponsored by Avaya
VIDEO: This brief video provides helpful hints for turning the network you have into the network you need. By tuning in, you'll discover why software-defined networking provides the agility -- and security -- required to keep pace with your business.
Posted: 23 Dec 2015 | Premiered: 08 Oct 2015

Avaya

Cyberthreat Defence Report: Malware Tops the Charts
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, find out how to identify, contain, and remediate unknown threats through real-time analysis. Discover how to close SSL blind spots and secure mobile devices and remote access endpoints inside.
Posted: 03 Feb 2016 | Published: 25 Feb 2015

Blue Coat Systems

Threat intelligence
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school looks at what a threat intel service can and cannot provide and discusses the status of the new(ish) standards for intelligence exchange.
Posted: 20 Jan 2016 | Premiered: 15 Jan 2016

SearchSecurity.com

Prioritizing IT Monitoring Alerts with Anomaly Severity Scores
sponsored by Prelert
WHITE PAPER: This white paper examines why organizations are turning to behavioral analytics to reduce noise and takes a closer look at one organization's success with the strategy.
Posted: 01 Feb 2016 | Published: 12 Aug 2015

Prelert
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement