IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security Network Reports
Holistic Protection against Today's Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses how implementing a holistic threat protection technology can help you protect more of your network while spending less.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

Key Considerations for Choosing Your Strong Authentication Strategy
sponsored by Imprivata
WHITE PAPER: This white paper presents the 7 forms of strong authentication and explores the benefits of each one. Continue reading to learn more about the factors to consider when choosing strong authentication and how to take your IAM strategy to the next level.
Posted: 24 Sep 2015 | Published: 28 May 2015


Using Big Data and Behavioral Analytics to Enhance Cybersecurity
sponsored by Splunk
WEBCAST: Demetrios Lazarikos, IT security strategist and thought leader, addresses the growing importance of data security in enterprise, financial and healthcare industries. Demetrios also highlights how behavioral analytics, in combination with big data tools, can be used by IT security personnel to establish alerts and enhance security.
Posted: 01 Sep 2015 | Premiered: Jan 18, 2014


Operation Clandestine Wolf: A Successful Zero-Day Attack Examined
sponsored by FireEye
WEBCAST: This webcast explores the anatomy of the attack and how APT3 achieved success.
Posted: 25 Sep 2015 | Premiered: Jun 24, 2015


Building a Custom Defense for Today's Security Threats
sponsored by Trend Micro
WHITE PAPER: This white paper offers a series of solutions designed to help your organization prevent the potential consequences of advanced threats.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Trend Micro

Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett-Packard Company
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 08 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company

Using Big Data for Data Security
sponsored by Splunk
WEBCAST: This webcast demonstrates how to accurately determine the threat activity your organization faces.
Posted: 02 Sep 2015 | Premiered: Jan 16, 2014


When Reputation is Not Enough: Spam Firewall Predictive Sender Profiling
sponsored by Barracuda Networks
WHITE PAPER: In this white paper, you'll uncover how to detect the uncharacteristic behavior of spam emails and blacklist the sender before the slew of spam hits your inbox.
Posted: 09 Sep 2015 | Published: 08 Jul 2015

Barracuda Networks

Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn the four key considerations for addressing sophisticated DDoS attacks.
Posted: 02 Oct 2015 | Published: 15 Jan 2015


Data Protection and Business Continuity in a Mobile World: A Guide for SMBs
sponsored by Hewlett-Packard Company
WHITE PAPER: This report discusses the specific security challenges that face SMBs and gives advice for how they can keep their data secure with the resources they have.
Posted: 30 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement