IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration Reports
2016 State of the Channel Ransomware Report
sponsored by Datto
RESOURCE: 93% of IT service providers reported that their clients were successfully attacked by ransomware despite having anti-virus/malware software in place. Access this report to learn about the state of ransomware in 2016 and how to stay ahead of these impending malware attacks.
Posted: 10 Oct 2016 | Published: 10 Oct 2016


Intelligence Reporting: Answers to Your Security Questions
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: This product overview highlights an advanced security intelligence reporting service that can provide answers to your crucial security questions. Learn how this service can reduce damage caused by advanced attacks by accessing now.
Posted: 25 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016


Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


How To Build An Enterprise Application Security Program
sponsored by Symantec + Blue Coat
EGUIDE: Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

Symantec + Blue Coat

Protecting and Empowering your Connected Organization
sponsored by Microsoft
WHITE PAPER: This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


How to Segment Cloud Workloads for Better Security
sponsored by IBM
EGUIDE: Discover the benefits of microsegmentation to secure your dynamic workload environments and learn how to prepare your IT environment for the shift. Mitigate attacks on cloud workloads and quickly apply new policies as new threat vectors emerge.
Posted: 19 Oct 2016 | Published: 18 Oct 2016


Top Phishing Attacks: Discovery and Prevention
sponsored by Agari
WHITE PAPER: Learn the behaviors of, and remedies for, 6 of the top phishing attacks that are targeting enterprises in ever increasing numbers.
Posted: 20 Oct 2016 | Published: 20 Oct 2016


8 Best Practices to Ensure Compliance When Adopting Cloud Apps Services
sponsored by Symantec + Blue Coat
WHITE PAPER: Learn 8 ways to begin developing a strategy that will enable you to adopt cloud applications and services while still protecting data. Not only protecting data, but maintaining compliance as well.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

Symantec + Blue Coat

When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement